TOP-3 factors of IoT governance - FACETER Облачное видеонаблюдение

TOP-3 factors of IoT governance

13.05.2021
Денис Артемьев
Video Surveillance Industry

TOP-3 factors of IoT governance

In 2009, the number of devices connected to the network reached the world’s population. And by the middle of last year, the total number of “smart household items” such as telephones, surveillance cameras, lamps, air conditioners, refrigerators, etc., exceeded 50 billion units. Not surprisingly, IoT governance concerns the best scientists. Let’s talk in more detail.

Timeline of the emergence of the Internet of things

We can say that the history of an  Internet of Things phenomenon began with the prediction of N. Tesla. In 1926, he announced that the time would come when there would be a “big brain” and many different small elements that would fit in a jacket pocket and be connected to it.

By defining “big brain,” the Serbian inventor meant an improved version of the radio. If we consider the computer as an improved radio, and under the small elements – modern gadgets-the scientist was 100% right.

Formally, the Internet of Things began its existence in 1982, in one of the American student dormitories, with a Coca-Cola machine. As the stocks of bottles were quickly running out, enterprising students connected sensors to detect the presence of bottles and their temperature. The sensors were connected to a computer. However, the development did not go beyond the university.

In 1990, the household toaster operation was synchronized with a computer through carrying out control for the first time. The authors of the development were Simon Hackett and John Risky.

After nine years, an engineer from the UK, K. Ashton, introduced the first definition of “Internet of Thing” (IoT or Internet of Things).

IoT devices, what does this mean today?

A kind of global network capable of computing, combining different physical objects, and having the ability to interact with each other and the outside world, is called the Internet of Things. 

Only forward

Lately, the invention of the “smart home” or “smart office” is considered the apotheosis of the IoT in the 21st century. However, technology has gone ahead: in almost every country globally, systems of safe “smart cities” are being developed.

A lot of useful and interesting information on this topic can be found in the article “Video surveillance is the foundation of a safe city. Integration issues ”.

TOP-3 factors of influence

In proportion to the number and variety of new devices with access to the global network, the number, and variety of problems in this area are growing. And the most important of them are related to the compatibility of elements and ensuring cybersecurity.

Component compatibility

I will explain using the example of video surveillance.

Previously, the principle of operation of the video control system was as follows: a video camera recorded images and sent them (via a special cable) to a video recorder. At the same time, each device (video camera and recorder) had different purposes and performed separate functions.

 Today, the entire video monitoring system is controlled by a single IP network and software that interacts with all elements. Accordingly, the technical compatibility of the constituent parts is essential. It provides flexibility and a high potential for the overall IT organism.

Scope of security problems

For the foreseeable future, cybersecurity will remain the top priority for IoT users. Hacker attacks, various malicious programs will seek to penetrate, infest and destroy personal data and intellectual property.

Both today and tomorrow, automated programs will be aimed at identifying weaknesses in the IoT system. It would seem that constant threats should lead to a decrease in interest and the number of connected household items to the global network. But they do not!

On the contrary, the IoT market is snowballing. Accordingly, the market for cybersecurity solutions will grow.

The existing six methods of protecting a “smart home” from hacking are written in this article.

Advanced Security Protocols

Already today, for example, intelligent video surveillance systems are protected not only with passwords/logins but also through temporary blocking of IP addresses (in case of many unsuccessful login attempts).

When using Wi-Fi cameras, the current password of each camera must be stored on the local device and in the general VMS network.

A similar principle of operation applies to IP cameras: they are equipped with schemes for sending proactive messages to VMS and storage systems for security passwords in the local network. At the same time, all parts of the system must have information about each “colleague” ‘s enhanced security protocols to avoid blocking and false emergencies.

Experts assume that as new technologies are introduced, the global network will have more complex controls.

Results

The development of the Internet of Things market, including intelligent video surveillance, is a natural evolutionary course of events. Today, “smart” video cameras have been introduced into all spheres of human life at the level of the state, business, and private use. Do you want to know more? Go to the website https://faceter.cam/en.

Еще больше обзоров, кейсов и полезной информации о видеонаблюдении в нашем официальном Telegram-канале. Подписывайтесь, чтобы оставаться в курсе важных событий.

Денис Артемьев
Денис Артемьев
Специалист в области видеонаблюдения, видеоаналитики, облачных систем хранения данных. Консультант по вопросам интеграции систем и средств видеонаблюдения в различные сферы бизнеса. Опыт работы в отрасли более 10 лет.
Video Surveillance Industry
Опубликовано: 13.05.2021

интересное от Faceter

Silhouette Recognition: 3 Reasons for Implementing the System in the Moscow Region
In many public places in the Moscow region, the video surveillance systems began to introduce the function of “recognition of silhouettes of people.” Video surveillance in medical institutions, passenger transport,...
The level of responsibility of buildings and structures and video surveillance
Video surveillance performs the tasks of ensuring security in a particular territory. The more dangerous the object of observation, the more detailed it is necessary to approach the issue of...
Video surveillance of animals in the zoo: 6 reasons + live broadcasts
Watching wildlife is always an exciting activity. But sometimes, video surveillance of animals becomes vital for them. It’s about zoos. Yes, there is the staff who feed and look after...
Watch out! 7 unexpected places with hidden video surveillance
The installation of CCTV cameras is strictly regulated by Russian law. Violation of the laws is punishable by a fine and criminal liability. However, there are places where video surveillance...
Video surveillance at a construction site + crane video surveillance
The areas of objects covered by video surveillance are becoming wider. Cloud-based construction video surveillance has become accessible and relevant nowadays. There are many issues that video surveillance at the...
How to display the camera image on a monitor? 4 ways + Faceter
Users of the video surveillance system don’t always need to record a video file from a recorder. Sometimes it is enough to display the image from the camera on the...
Election surveillance cameras. 98% coverage at 50,000 polling stations.
Video surveillance is expanding its position. More and more often video surveillance is used not only by businesses, and private individuals in-home surveillance, but also by government agencies. No one...
Video surveillance repair. Common problems and 5 sources of breakdown
Any equipment, either simple or complex, eventually needs repairing. It is also true for video surveillance systems. Considering its functionality and the tasks performed, you need to have the surveillance...
Poor image of a video camera: 5 reasons and 12 solutions
The image of a video camera is one of the main points of a surveillance system. It is important to pay close attention to its condition. Why the picture from...
6 situations in life when a video camera is simply necessary
We are used to the fact that there are surveillance cameras in public places, in trading facilities. The need for video surveillance has also become relevant for private life. Affordability,...
Voltage drop and quality of video surveillance: 3 countermeasures
There are different indicators that affect the effectiveness of a video surveillance system. Today let’s talk about the voltage drop in the cable line of CCTV equipment. How to determine...
Cameras for computer vision: review and selection criteria
Computer vision (CV) is increasingly taking a position in the video surveillance market. This activity is justified because video monitoring systems with computer vision cameras are more accurate in their...
What is the computer vision technology? 2 tasks and self-study
It is already difficult to imagine a business facility, a territory, and dwellings without video surveillance. The need to install surveillance cameras in public places is established by law. Electronic...
Video surveillance and the Internet speed: 6 options for reducing consumption
It is extremely difficult to imagine one’s life without the Internet. Almost all human activity relies on the capabilities of the World Wide Web. It is often necessary to look...
Video recording of road accidents in the stream of vehicles. The solution for everyone.
It is not always possible to fairly understand who was at fault in the accident. Fear, desire to hide the details, and the lack of witnesses prevent a full-fledged proceeding....