TOP-3 factors of IoT governance

TOP-3 factors of IoT governance

In 2009, the number of devices connected to the network reached the world’s population. And by the middle of last year, the total number of “smart household items” such as telephones, surveillance cameras, lamps, air conditioners, refrigerators, etc., exceeded 50 billion units. Not surprisingly, IoT governance concerns the best scientists. Let’s talk in more detail.

Timeline of the emergence of the Internet of things

We can say that the history of an  Internet of Things phenomenon began with the prediction of N. Tesla. In 1926, he announced that the time would come when there would be a “big brain” and many different small elements that would fit in a jacket pocket and be connected to it.

By defining “big brain,” the Serbian inventor meant an improved version of the radio. If we consider the computer as an improved radio, and under the small elements – modern gadgets-the scientist was 100% right.

Formally, the Internet of Things began its existence in 1982, in one of the American student dormitories, with a Coca-Cola machine. As the stocks of bottles were quickly running out, enterprising students connected sensors to detect the presence of bottles and their temperature. The sensors were connected to a computer. However, the development did not go beyond the university.

In 1990, the household toaster operation was synchronized with a computer through carrying out control for the first time. The authors of the development were Simon Hackett and John Risky.

After nine years, an engineer from the UK, K. Ashton, introduced the first definition of “Internet of Thing” (IoT or Internet of Things).

IoT devices, what does this mean today?

A kind of global network capable of computing, combining different physical objects, and having the ability to interact with each other and the outside world, is called the Internet of Things. 

Only forward

Lately, the invention of the “smart home” or “smart office” is considered the apotheosis of the IoT in the 21st century. However, technology has gone ahead: in almost every country globally, systems of safe “smart cities” are being developed.

A lot of useful and interesting information on this topic can be found in the article “Video surveillance is the foundation of a safe city. Integration issues ”.

TOP-3 factors of influence

In proportion to the number and variety of new devices with access to the global network, the number, and variety of problems in this area are growing. And the most important of them are related to the compatibility of elements and ensuring cybersecurity.

Component compatibility

I will explain using the example of video surveillance.

Previously, the principle of operation of the video control system was as follows: a video camera recorded images and sent them (via a special cable) to a video recorder. At the same time, each device (video camera and recorder) had different purposes and performed separate functions.

 Today, the entire video monitoring system is controlled by a single IP network and software that interacts with all elements. Accordingly, the technical compatibility of the constituent parts is essential. It provides flexibility and a high potential for the overall IT organism.

Scope of security problems

For the foreseeable future, cybersecurity will remain the top priority for IoT users. Hacker attacks, various malicious programs will seek to penetrate, infest and destroy personal data and intellectual property.

Both today and tomorrow, automated programs will be aimed at identifying weaknesses in the IoT system. It would seem that constant threats should lead to a decrease in interest and the number of connected household items to the global network. But they do not!

On the contrary, the IoT market is snowballing. Accordingly, the market for cybersecurity solutions will grow.

The existing six methods of protecting a “smart home” from hacking are written in this article.

Advanced Security Protocols

Already today, for example, intelligent video surveillance systems are protected not only with passwords/logins but also through temporary blocking of IP addresses (in case of many unsuccessful login attempts).

When using Wi-Fi cameras, the current password of each camera must be stored on the local device and in the general VMS network.

A similar principle of operation applies to IP cameras: they are equipped with schemes for sending proactive messages to VMS and storage systems for security passwords in the local network. At the same time, all parts of the system must have information about each “colleague” ‘s enhanced security protocols to avoid blocking and false emergencies.

Experts assume that as new technologies are introduced, the global network will have more complex controls.


The development of the Internet of Things market, including intelligent video surveillance, is a natural evolutionary course of events. Today, “smart” video cameras have been introduced into all spheres of human life at the level of the state, business, and private use. Do you want to know more? Go to the website

Александр Вебер

Alexander Weber

Specialist in video surveillance, video analytics, cloud storage systems. Consultant on the integration of video surveillance systems and tools in various business sectors. Over 10 years of industry experience.

See also