Monday, 9 January 2023

China cyberwar: Beijing’s dominance in IoT & smart technology & vulnerabilities for India:



New Delhi: The smart washing machine at your house, the fridge that knows how to monitor temperature and order refills, the coffee machine at work that you can get going while on your way to office — the internet of things is transforming our lives. It is also developing into the most far-reaching and intrusive tool for intelligence gathering, taking spies into our bedrooms and living rooms. The chips embedded into those devices talk to you, but also talk to servers operated by the People’s Republic of China’s intelligence services.

For India, the growing ubiquity of China-dependent IoT and smart technologies holds ramifications in both critical infrastructure and military domains.


The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.

thing in the internet of things can be a person with a heart monitor implant, a farm animal with a biochip transponder, an automobile that has built-in sensors to alert the driver when tire pressure is low or any other natural or man-made object that can be assigned an Internet Protocol (IP) address and is able to transfer data over a network.

Increasingly, organizations in a variety of industries are using IoT to operate more efficiently, better understand customers to deliver enhanced customer service, improve decision-making and increase the value of the business.

How does IoT work?

An IoT ecosystem consists of web-enabled smart devices that use embedded systems, such as processors, sensors and communication hardware, to collect, send and act on data they acquire from their environments. IoT devices share the sensor data they collect by connecting to an IoT gateway or other edge device where data is either sent to the cloud to be analyzed or analyzed locally. Sometimes, these devices communicate with other related devices and act on the information they get from one another. The devices do most of the work without human intervention, although people can interact with the devices -- for instance, to set them up, give them instructions or access the data.

LINKhttps://iot-conferences.sciencefather.com/

FOR ENQUIRESiot@sciencefather.com

VISIT OUR WEBSITE:

                                Abstract Submission:   https://x-i.me/sacon

                                Conference Reg:          https://x-i.me/sareg1

                                Award Nomination:     https://x-i.me/iotnom

                                Award Reg:                   https://x-i.me/sares2

                                Member Nomination:  https://x-i.me/iotmem   

#internet#technology#automation#cloudcomputing#edgecomputing#protocals#dishwasher#5gNetworks#4gNetwork#technology conferences#


No comments:

Post a Comment

A Milestone for securing the Internet of Things: Infineon welcomes introduction of a voluntary U.S. IoT security label.

  Today, U.S. Deputy National Security Advisor Anne Neuberger, Chairwoman of the Federal Communications Commission (FCC) Jessica Rosenworcel...