dcsimg

Find an IT Download

Network of 'Things'

This document offers a foundational understanding of IoT based on the realization that IoT involves sensing, computing, communication, and actuation.


2.6 MB | 3 files | null PDF

The National Institute of Standards and Technology (NIST) has released a new publication that provides a basic model aimed at helping researches better understand the Internet of Things (IoT) and its security challenges. Expected to approach nearly $2 trillion in market value by 2020, the IoT covers an incredibly large range of technologies – everything from smart homes, wearables, smart factories and building, self-driving cars to health care monitors.

Given the breadth of devices involved, NIST computer scientist Jeff Voas determined that "there is no formal, analytic or even descriptive set of building blocks that govern the operation, trustworthiness and lifecycle of IoT components." Instead, Voas has created a new model called the Network of Things (NoT) based on distributed computing, which has been in use for decades. In distributed computing, computer components are networked and share messages about tasks to operate efficiently. A simple example is the local area network in an office where computers share a printer. The Network of Things (NoT) model is based on four fundamentals at the heart of IoT— sensing, computing, communication and actuation.

This document offers an underlying and foundational understanding of IoT based on the realization that IoT involves sensing, computing, communication, and actuation. The material presented here is generic to all distributed systems that employ IoT technologies (i.e., 'things' and networks). The expected audience is computer scientists, IT managers, networking specialists, and networking and cloud computing software engineers.

The attached zip file includes:

  • Intro Page.pdf
  • Terms and Conditions.pdf
  • NetworkOfThings.pdf

Related IT DOWNLOADS

Recent IT Downloads
Building a GRC Program: Assessing Stakeholder Needs and Readiness

This table outlines the top needs of each stakeholder group that can help guide your conversat...Read More

Recent IT Downloads
Guide to Cyber Threat Information Sharing

This publication provides guidelines for establishing and participating in cyber threat inform...Read More

Recent IT Downloads
Colocation Checklist

This checklist will help make sure you ask the important questions that will affect your coloc...Read More

Recent IT Downloads
Trustworthy Email

This document provides recommendations and guidelines for enhancing trust in email, including ...Read More