Applications of Sensor Networks in different fields
Discuss about the Privacy and Security Reflection for Sensor Network.
According to me sensor network is a system which responds and senses some type of input from both the corporal or ecological conditions outputs an electrical signal that is transmitted to a controller for additional processing and I believe that the Smart State Plan provided by the Australian state government help all the sections of the society to analyse the information security and privacy implications on their business (De Gante, Aslan & Matrawy, 2014). The system effects standard is aimed at serving the medical, industrial and ecological challenges. Sensor applications in many fields such as smart power grids, smart buildings and smart industrial process control significantly contribute to the more efficient use of resources (Magno et al., 2015). Security and surveillance use sensor networks facilities in the military and defence area. Sensor networks are used in multiple ways in the healthcare sector such as tracking the activities of patients and doctors, drug management and diagnostic applications. I believe the sensory networks are also used for structural strength monitoring of big civil or urban structures. The advanced sensory networks are effectively used in mesh networking (Ilyas & Mahgoub, 2016). I believe that the concept of smart cities can be achieved with the help of sensory networks.
According to me, sensory networks have a direct impact on the behaviour of people. Intelligently planned systems help in cumulating worker efficiency, energy cost savings and organizational savings. The criminal activities can also be checked with the active use of the different types of sensory networks. Citizens can be provided more security by installing more cameras to read license plates and track the vehicles who are disobeying the traffic regulations. Investigation of any crime can be checked by the use of mobile sensors as it involves the packing and retrieval of sensed data (Lau, 2015). Application of sensory network is used to support disabled people providing harmless, safe surroundings. The networks can allow the user to control many features or automate them and the environment can also be checked by the smart home system sensory network to ensure security and alert people when there is some insecure condition.
I believe that there will be lots of individual behavioural changes due to the extensive use of sensory networks which provide great facilities to the disabled persons who do not have arms or hands. Due of their inability, they fail to reach the key to open and lock the door of their house but with the help of advanced systems, they can recognize the person who approaches to the door and decide whether to open or not open the gate according to the identity of the person (Ransing & Rajput, 2015). The applications of several sensory networks had a direct impact on the life of citizens of Singapore providing them with more security and guide them for the overall improvement of their nation. I think the security of the people has increased to a greater extent with the use of systems such as advanced cameras in every corner of the streets but it also involves few ethical issues like hacking which needs to be sorted so that the efficiency of the system is maintained. The other prime ethical issues are the data of the security of the citizens. The main issue is the safety of this information collected by the smart sensors for the citizens (Jin et al., 2014). The security of that data is in doubt as this might can be hacked. Successful hacking of those information can expose the susceptibility of any individual citizen to the hackers. I think the extensive use of sensory networks makes the city safer at late nights. It helps to maintain the protocols and develop a perfect approach to face any kind of situation according to the requirement. I believe the automobile users install wireless connectivity in their cars which enable communications both with roadside base stations and between vehicles for the purposes of security, driving assistance and entertainment. Summarising the topic, I would like to say that sensory networks provide the most advanced monitoring solutions helping them to be more secure.
Impact of Sensor Networks on People’s Behaviour
According to me the Wi-Fi technologies are extensively adopted and play a significant role in increasing the life quality of all types of people as it is helpful in empowering the city with better services and facilities. I think smart waste management, smart security and smart lighting in public places are relying on cloud Wi-Fi infrastructure. The smart Wi-Fi network helps all the citizens who can’t afford internet facilities at home as they can enjoy a free internet connection and use them for various types of purposes like access in public services, searching for jobs and personal entertainments (Budde, 2013). I think that Wi-Fi infrastructure helps the people for more online shopping rather the conventional shopping techniques as people might like to enjoy various services at sitting in their home. There can be many changes which can be observed by the effective application of free Wi-Fi hotspots such as people can have much improved travelling plans with real-time information about transports by using the Wi-Fi hotspots (Potts, 2014). Public Wi-Fi access can have a huge impact on the tourism industry as tourists always want to stay associated with their family and friends share their moments on their social networks and check the travel information. As a result, they are more incentivized to travel to such a location having free public Wi-Fi.
I believe that the application of the Wi-Fi hotspots will be having many behavioural changes because every nation with free Wi-Fi hotspots would be advantageous both for the travellers who would appreciate internet connection without roaming charges and also for the local public for facing a large profit from enlarged levels of tourism. I believe that student and teachers can also effectively use Wi-Fi enabled systems for educational purposes and the institutions can also develop advanced education methods based on collaborative and interactive knowledge. I think there will be significant improvements in the sales in retail stores, restaurants, bars, salons, hotels and shopping malls who provides free Wi-Fi connection to their customers.
According to me, there will be many behavioural changes among the peoples for using the internet extensively like instant chat or email their family and friends all around the globe. International friendships will be made easier, online dating will be more practised and people should be able to create their own websites according to the requirements. For me, the main problems with public Wi-Fi are the tremendous number of risks that go along with those networks; I guess we should not allow the public internet connection to get auto-connected to our systems as it may have a negative impact on the important data and information on our system. After using the free network, the connection should be interrupted so that there is no chance for any external threats to access the system (Cheng et al., 2013).
Advantages and Disadvantages of Public Wi-Fi and Use of Digital Identity
I believe the file sharing options on the mobile phones should always be activated so that when needed they can be deactivated and made for use. I believe that the biggest risk of using free Wi-Fi is security as the hackers positions themselves between me and my connection points. I would personally recommend the habit of using a VPN connection when connecting to an unsecured connection like a public Wi-Fi hotspot. It will provide us with more security from the external threats even if the hacker position himself between the two systems hence our data here will be strongly encrypted. We should preferably use the websites with https in front of the URL for safety reasons. The free connection should be deactivated when we are not accessing the internet as it will help them to restrict the unauthorized access of the threats.
If you were visiting the State Capital after the Smart State Plan has rolled out, do you think that the use of a digital identity would assist you to maintain your privacy while using your mobile phone or devices during your visit? Discuss the reasons for your answer
According to me the digital identity one an individual is a set of attributes allowing a third party to asses and confirm the authenticity of the individuality in question and the claims being made by it. It is the intersection of identity and technology and the most defining factor in digital identities is that they’re permanent (Adelman & Chadwick, 2014). I believe that the role of digital identity is progressively an attention of the policy negotiations across different countries with a number of governments suggesting or implementing national digital identity programmes, governments intends to provide a single digital identity to every citizen of a particular nation for more precise and efficient delivery of government facilities. According to me the use of digital identity would assist me to maintain my privacy while using my personal devices in many ways (Mellmer et al., 2014). I believe that every industry needs an identity declaration for its commercial enterprises such as e-Commerce, online banking and trading. It helps to keep our uniqueness and maintaining the infrastructure of the country in a secure way as we can see that identity burglary and other online criminal activity is a rising anxiety for citizens, governments and enterprises as financial, emotional and practical costs are at stake and growing every year. Digital identities are easy to exploit and highly profitable, the other importance of digital identity includes its helping abilities in businesses to understand their clients better without interacting with them face-to-face and establish lasting relationships with them (Grassi, Garcia & Fenton, 2017). It is useful in attracting and retaining customers and delivering new levels of value and growth. I believe the use of digital identity is helpful in tracking data breaches and the exposure of personal information. The fundamental value to one’s digital identity is Trust. In the real world I found that an individual is able to effortlessly authorize their uniqueness by presenting documents such as an ID or driver’s license that are issued by authorities based on verifiable information provided by that individual and these authorities are reliable the documents they issue can be used by the individual to verify their identity with many diverse organizations that might be offering services.
The Role of Digital Identity in Maintaining Privacy
According to me, there are several effective ways in which our personal data can be kept securely on our mobile devices (Mu, Cui & Rao, 2013). Cyber criminals are able to access our personal information online through there unethical methods to stop that we need to secure our systems by using a strong password with special characters but there is a drawback of that procedure as forgetting that password will be creating more complexity for us (Baym, 2015). Choosing a unique security question in any social media platforms provides security to the accounts but forgetting those lead us to the password recovery mode which a time-consuming task is (Ion, Reeder & Consolvo, 2015). I would recommend of modern platforms like Gmail provides a double verification process which is considered a very safe and unique method of data protection but it has a disadvantage of accessing two devices at a time. I believe that our mobile phones should be secured with both internal and external security software which helps to restrict the unauthorized users in our system but it is often found that the software decreases the efficiency of the mobile as it slows down the overall performance (Mikhaylov et al., 2013). We should avoid clicking unfamiliar links in spite of knowing its importance in order to protect the data on a long-term basis. I think that the practice of using private browsers should be encouraged in spite of knowing that the data could never be retrieved. We should avoid giving our banking details in an e-commerce transaction from our mobile as they are a disadvantage of money deductions in the future. Automatic software updating should be activated on our mobile phones which are very much recommended for various types of security reasons. Installation of the Operating system updates is necessary as it updates the in-built security systems of our mobiles but it may have a negative impact such as the improper functioning of any software due to compatibility issues. I believe that we all should read the policies of the software before installing them in our mobile phones it may be a time-consuming affair but it is important to know how it uses the information and whether it delivers information to third parties or not. I would like to recommend having different passwords for banking, social media, email even if it is difficult to remember them as a hacker only needs to figure out just one password to gain access to all the forums. I think we should all set up login notifications in our mobile phones for platforms like Facebook and Gmail which will allow us to receive a text message whenever an unrecognized IP address logs in to the account.
Reference
Adelman, W., & Chadwick, M. (2014). U.S. Patent No. 8,904,040. Washington, DC: U.S. Patent and Trademark Office.
Baym, N. K. (2015). Personal connections in the digital age. John Wiley & Sons. Personal connections in the digital age. John Wiley & Sons.
Budde, M., Köpke, M., Berning, M., Riedel, T., & Beigl, M. (2013, September). Using a 2DST waveguide for usable, physically constrained out-of-band Wi-Fi authentication. In Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing (pp. 221-224). ACM.
Cheng, N., Wang, X. O., Cheng, W., Mohapatra, P., & Seneviratne, A. (2013, April). Characterizing privacy leakage of public wifi networks for users on travel. In INFOCOM, 2013 Proceedings IEEE (pp. 2769-2777). IEEE.
De Gante, A., Aslan, M., & Matrawy, A. (2014, June). Smart wireless sensor network management based on software-defined networking. In Communications (QBSC), 2014 27th Biennial Symposium on (pp. 71-75). IEEE.
Grassi, P. A., Garcia, AM. E., & Fenton, J. L. (2017). Digital identity guidelines. NIST Special Publication, 800, 63-3.
Ilyas, M., & Mahgoub, I. (2016). Smart Dust: Sensor network applications, architecture and design. CRC press.
Ion, I., Reeder, R., & Consolvo, S. (2015, July). “… No one Can Hack My Mind”: Comparing Expert and Non-Expert Security Practices. In SOUPS (Vol. 15, pp. 1-20).
Jin, J., Gubbi, J., Marusic, S., & Palaniswami, M. (2014). An information framework for creating a smart city through internet of things. IEEE Internet of Things journal, 1(2), 112-121.
Lau, Y. C. L. (2015). Cybercrime in cloud: Risks and responses in Hong Kong, Singapore.
Magno, M., Polonelli, T., Benini, L., & Popovici, E. (2015). A low cost, highly scalable wireless sensor network solution to achieve smart LED light control for green buildings. IEEE Sensors Journal, 15(5), 2963-2973.
Mellmer, J. A., Young, R. T., Perkins, A. D., Robertson, J. M., Sabin, J. N., Mcdonald, M. C., … & Carter, S. R. (2014). U.S. Patent No. 8,631,038. Washington, DC: U.S. Patent and Trademark Office.
Mikhaylov, D., Zhukov, I., Starikovskiy, A., Kharkov, S., Tolstaya, A., & Zuykov, A. (2013, November). Review of malicious mobile applications, phone bugs and other cyber threats to mobile devices. In Broadband Network & Multimedia Technology (IC-BNMT), 2013 5th IEEE International Conference on (pp. 302-305). IEEE.
Mu, J., Cui, A., & Rao, J. (2013, July). Android mobile security–threats and protection. In Proceedings of international conference on computer, networks and communication engineering (ICCNCE 2013) (pp. 23-24).
Potts, J. (2014). Economics of public WiFi. Australian Journal of Telecommunications and the Digital Economy, 2(1).
Ransing, R. S., & Rajput, M. (2015, January). Smart home for elderly care, based on wireless sensor network. In Nascent Technologies in the Engineering Field (ICNTE), 2015 International Conference on (pp. 1-5). IEEE.