IT PARK
    Most Popular

    OpenAI develops new tool that attempts to explain the behavior of language models

    May 21, 2025

    How to solve the problem of computer blue screen? What about the blue screen of the computer?

    May 07, 2025

    What is brute force cracking?

    Apr 23, 2025

    IT PARK IT PARK

    • Home
    • Encyclopedia

      How is fingerprint recognition achieved?

      May 21, 2025

      Do you know what 3D Mapping is?

      May 20, 2025

      What is the hosts file? Where is the hosts file?

      May 19, 2025

      Apple phone into the water how to do? Four first aid measures to help you

      May 18, 2025

      A one-minute walk through the difference between a switch and a router

      May 17, 2025
    • AI

      OpenAI develops new tool that attempts to explain the behavior of language models

      May 21, 2025

      Meta Quest 3 expected to support generative AI by 2024

      May 20, 2025

      Can AI work this round when you ask a doctor online to break a disease?

      May 19, 2025

      NASA is developing an artificial intelligence interface where astronauts can talk directly to AI

      May 18, 2025

      76-year-old father of deep learning Hinton left Google! Publishes AI threat theory, pessimistic prediction of catastrophic risk

      May 17, 2025
    • Big Data

      What is Data Governance? Why do organizations need to do data governance?

      May 21, 2025

      Winning Business Excellence with Data Analytics

      May 20, 2025

      Has the development of big data come to an end?

      May 19, 2025

      How Research Institutes Should Use Data Analytics Tools to Improve Research Efficiency

      May 18, 2025

      How to Program Big Data Effectively

      May 17, 2025
    • CLO

      Last-generation firewalls won't meet cloud demands

      May 21, 2025

      Healthcare Explores Cloud Computing Market: Security Concerns Raise, Multi-Party Collaboration Urgently Needed

      May 20, 2025

      Remote work and cloud computing create a variety of endpoint security issues

      May 19, 2025

      Three common misconceptions about sustainability and cloud computing

      May 18, 2025

      Ten Ways Cloud-Native Development is Changing Cybersecurity

      May 17, 2025
    • IoT

      Self-driving cars: Opening the wave of full digital disruption in the Internet of Things era

      May 21, 2025

      Smart Supply Chain Guide

      May 20, 2025

      Internet of Things and the Elderly

      May 19, 2025

      The Future of the Internet of Things and Self-Storage

      May 18, 2025

      Skills shortage remains the biggest barrier to IoT adoption in the oil and gas industry

      May 17, 2025
    • Blockchain

      Blockchain technology helps track new crown virus

      May 21, 2025

      Blockchain Foundation - What is Blockchain Technology

      May 20, 2025

      Blockchain Wallet

      May 19, 2025

      Scientists propose quantum proof-of-work consensus for blockchain

      May 18, 2025

      How blockchain technology can be applied to environmental protection to drive a green economy

      May 17, 2025
    IT PARK
    Home » IoT » Why sensors accumulate so much sensitive data
    IoT

    Why sensors accumulate so much sensitive data

    In the age of information technology, data are exchanged not only between people but also between things (this is how the Internet of Things works). Some of this data is very sensitive.
    Updated: Apr 07, 2025
    Why sensors accumulate so much sensitive data

    Necessity is the mother of invention. But in many cases, con artists are the driving force behind any progress. In the age of information technology, data is exchanged not only between people, but also between things (this is how the Internet of Things works). Some of this data is very sensitive. So what data can IoT sensors collect, where is it stored, and how dangerous could it be if made public? Let's explore it further.

         IoT sensors: what data can be collected?

    An IoT sensor could be installed on a trash can and called a "smart" trash can. A signal that the trash can is full would be sent to the utility company, and the dispatcher would use that data to plan the route of the trash trucks and clean only the full trash cans. Let's say someone wants to make a joke, hacks into the system and starts replacing the data then the trash removal problem could lead to the collapse of the entire city.

    Another example from smart cities where IoT sensors can control, for example, traffic signals is called smart transportation. If a traffic signal crashes, then a traffic meltdown will occur almost immediately.

    You can also give many examples from various fields, even in agriculture where IoT sensors control irrigation systems. By replacing data about soil moisture, you can water or let a field dry out. After such irrigation, it is unlikely that anything will grow there and the damage will be in the millions.

    In other words, at first glance, data from IoT sensors seems completely harmless until some bad guy uses it.

         IoT software development: the main technologies

    Today there are already two data transmission technologies: LoRaWAN and NB-IoT, which in my opinion are the leaders in this industry. At the same time, solutions similar to these technologies can be developed in various countries.

    The main difference between these two technologies is that LoRaWAN is deployed on its base station, while NB-IoT uses the mobile operator's network. Also, using NB-IoT requires the use of a SIM card from the same operator. Due to this symbiotic relationship, the solution is more secure but at the same time consumes less energy, which greatly increases its range of applications using autonomous power sources without being connected to an external power source.

    Data from IoT sensors is mainly transmitted and stored in the cloud. Two other stable leaders have emerged in this field, AWS and Azure. meanwhile, there are other local servers that primarily store data with restricted access. Of course, access to these servers is provided through the use of special keys assigned to employees and through secure channels.

         What is a data lake?

    With the development of cloud technology, it has become possible to store more data than ever before. Previously, databases only stored structured data. Now, this data is more valuable as unstructured content can be stored. This technology is known as data lakes.

    With the advent of data lakes, it has become possible to accumulate data for future use. For example, IoT sensors can transmit information about wind speed, as well as information about services that are not currently of interest to anyone. However, today it is also possible to use AI to derive insights from unstructured data. Therefore, the next step is to look for patterns, which we refer to as synopsis files and their analysis to gain new insights.

    For example, in the example we found a "hidden" pattern that periodically reduces the voltage level during strong winds. After repeated measurements, it was possible to determine that this was occurring during a storm. As a result, we received information not only about the wind speed, but also about its possible cause, since the sensor was powered by solar energy.

    After analyzing the historical data and comparing the data with technical work in the field, it will be possible to derive the reasons for the poor yields, e.g. crop fertilizers were applied before the heavy rains and therefore they did not work.

    It is still difficult to say how the data collected will be used in the future. With these simple examples, it has become clear that information protection needs to be taken more seriously than it seems. If we are able to utilize the capabilities of security technology more effectively, it will allow us to launch IoT services in different areas much faster. This will be especially important in healthcare in the near future.

    Data IoT sensitive
    Previous Article How do Bluetooth headsets achieve noise cancellation?
    Next Article Who owns the copyright of the paintings created by AI for you?

    Related Articles

    IoT

    Iot and Internet misconceptions, which ones do you know?

    Apr 29, 2025
    IoT

    Smart Museums: 6 IoT Applications for Museums and Galleries

    May 05, 2025
    IoT

    The five basic types of IoT

    Apr 23, 2025
    Most Popular

    OpenAI develops new tool that attempts to explain the behavior of language models

    May 21, 2025

    How to solve the problem of computer blue screen? What about the blue screen of the computer?

    May 07, 2025

    What is brute force cracking?

    Apr 23, 2025
    Copyright © 2025 itheroe.com. All rights reserved. User Agreement | Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.