Could your organization be the next victim of a cyber attack? Few other technological advancements have been adopted by so many people in such a short period of time as the Internet of Things (IoT). Originally used by governments as a means of sharing information, IoT was first rolled out for mainstream commercial and consumer use in the early-to-mid 1990s. Just three decades later, it’s currently amassed 5.19 billion users globally— nearly two-thirds of the world’s population.
Defined as a global computer network enabling access to and communication with the world’s wealth of information, people, and devices, data industry expert Sean Mallon recently referred to IoT as “the most important development of the 21st century.”
The Dark Underbelly of IoT
While the Internet of Things has clearly transformed global communications, improved the speed and efficiency of information exchange for consumers and businesses alike, and impacted the fundamental way in which modern society interacts and operates, it has a dark side as well. This primarily takes the form of bad actors who capitalize on opportunities to use the technology for nefarious purposes.
Botnets
Take, for example, the use of botnets. Hackers infect these networks of private computers with malicious software. They then control the botnets remotely, directing each connected device to perform tasks without the network owners’ knowledge.
Within unsecured computers, bad actors can use botnets to deploy malware, steal personal information, and attack websites. For example, internet giants Cloudflare, Google, and Amazon Web Services narrowly avoided a disastrous attack in October 2023 when a botnet involving 20,000 computers attempted a record-large and unprecedented distributed denial-of-service (DDoS) attack on those three organizations’ websites and services.
Bad actors also use botnets as a key means of spreading misinformation. A real-life example of botnets proliferating in daily life and impacting a massive group of people was witnessed during the 2016 U.S. presidential election, when hackers used Twitter accounts to share inaccurate information that was made to appear factual and trustworthy in order to influence public opinion.
Malware
Malware– an umbrella term referring to any intrusive software that hackers develop to steal data and damage or destroy computers or systems– is yet another type of attack that can be perpetrated through IoT and any unsecured connected devices. It comes in various forms such as viruses, worms, spyware, adware, and ransomware.
Real-life examples of the threat posed by malware include what’s become known as “CovidLock,” a ransomware attack in 2020 that took advantage of people’s desire for more information on COVID to ultimately deny access to Android users’ devices unless they paid a “ransom” of US$100. In the business community, the famed “Emotet” virus in 2018 propagated financial theft of bank accounts and cryptocurrencies, resulting in damages of US$1 million to the city of Allentown, Pennsylvania and US$2 million to Chilean bank Consorcio. According to Statista, 5.5 billion malware attacks were detected globally in 2022. Experts fear that this number will only continue to grow worldwide with the proliferation of artificial intelligence (AI) tools.
Safeguard Your Company from IoT Cyber Threats
Given our global society’s ever-expanding use of the Internet of Things and connected devices, along with the growing sophistication of tools employed by hackers, is your organization adequately positioned to help prevent cyber attacks and the damage they can inflict on your company’s financial status, brand, and reputation?
All About IoT Security, an eLearning program from IEEE, is here to help you bolster your defense against this threat.
This online program recognizes that, as Internet devices and systems become increasingly commonplace in our interconnected and digitalized society, connected devices run the increasing risk of being targeted and abused as tools to facilitate other malicious activities.
Developed by IEEE Educational Activities with support from the IEEE Internet of Things Technical Community, this six-course program provides audience members with a broad overview of IoT security, starting with malware (botnet detection and malware analysis) followed by vulnerabilities, network monitoring, setting up of testbeds, and application of blockchain in IoT security.
Specifically, learners will receive instruction on challenges and opportunities in IoT security and how IoT botnets grow their networks as well as forensics of IoT malware, taxonomy when designing an IoT system for security purposes, and the application of blockchain to the IoT. The course program is ideal for engineers in the fields of product and design, communications systems, computers, software and security, artificial intelligence and machine learning.
Interested in access for yourself? To enroll in this course, visit the IEEE Learning Network.
Connect with an IEEE Content Specialist today to learn how to get access to this program for your organization today.
Resources
Petrosyan, Ani. (22 September 2023). Number of Internet and Social Media Users Worldwide as of July 2023. Statista.
Mallon, Sean. (14 May 2020). IoT is the Most Important Development of the 21st Century. SmartData Collective.
(5 December 2017). What is a Botnet?. Panda.
Temming, Maria. (20 November 2018). How Twitter Bots Get People to Spread Fake News. ScienceNews.
Starks, Tim and DiMolfetta, David. (11 October 2023). The Largest Cyberattack of its Kind Recently Happened. Here’s How. The Washington Post.
What is Malware? Cisco.
Privacy By Design. Deloitte.
(4 June 2021). 11 Real and Famous Cases of Malware Attacks. Gatefy.
Panduru, Diana. (9 August 2021). 10 Malware Examples: Most Famous And Devastating Cases In History. Attack Simulator.
Petrosyan, Ani. (31 August 2023). Malware – Statistics & Facts. Statista.
By the end of 2023, reports estimate the world will have over 16.7 billion connected Internet of Things (IoT) devices. This means there will be a tremendous amount of potentially vulnerable targets if they are not properly protected. As the world continues to implement more networks, the importance of IoT security will grow in order to maintain confidence in such devices and systems.
What is IoT Security?
The Internet of Things (IoT) can be defined as the network of software-embedded objects that connect and exchange data with themselves and other devices. IoT security focuses on safeguarding connected devices and networks in the Internet of Things. In other words, this technology segment can be understood as a cyber security strategy.
The Importance of IoT Security
Because troves of valuable and private data flow through IoT devices, they are extremely at risk for cyber attacks. Every device added to a network expands its digital attack surface, which is the number of weak points where an unauthorized user can access the system. This constant exposure to potential data theft and other invasions makes the need for IoT security solutions even more crucial.
While efficient, the interconnectedness of IoT devices unfortunately adds to the threat. Through just one compromised device, a hacker can gain access to the whole system. In a corporate environment where IoT devices are deployed on the network, they have access to the company’s sensitive data and critical systems. Cyber criminals commonly target unprotected printers, smart lighting, and other office devices to gain access to the network and its data.
With IoT, the use of sensors and smart devices to collect data for smart automation specifically benefits the fields of civil engineering, urban planning, and smart cities. Understanding the impacts of the data collected can help with the safe distribution of energy, assist in new structural designs and upgrades, and support the secure interconnection of IoT within smart cities.
Who Is Responsible?
Global legislation defines who is accountable for IoT Security. In the United States, the IoT Cybersecurity Improvement Act requires government agencies to review their IoT-related risks. Agencies must also adopt best practices for security. IoT device companies are legally responsible for ensuring their products are as secure as possible. Manufacturers are at fault for compromises and vulnerabilities. Given that a company’s product developers are at the front end of these discussions, IoT security is an important skill to master.
Any technical professional, from network security engineers to project managers, can benefit from learning about the valuable craft of IoT security.
Is Your IoT Network Secure?
Ensure the reliability of your company’s IoT network! IEEE Educational Activities, in partnership with IEEE Internet of Things Technical Community, developed the course program All About IoT Security to provide insight for defending IoT networks from threats. Comprised of six courses, this online training covers the challenges and opportunities around IoT security, botnet detection, and malware forensics. The program also goes more in depth, looking at business case studies, blockchain applications, and directing network traffic.
Connect with an IEEE Content Specialist today to learn how to get access to this program for your organization.
Interested in access for yourself? Visit the IEEE Learning Network (ILN).
Resources:
What Is An Attack Surface? Fortinet.
What Is IoT Security? Check Point.
H.R.1668 – IoT Cybersecurity Improvement Act of 2020. Congress.gov.
Sinha, Satyajit. (24 May 2023). State of IoT 2023: Number of connected IoT devices growing 16% to 16.7 billion globally. IoT Analytics.
Wi-Fi has been around for over 20 years. With each new generation, the world has seen remarkable gains in wireless performance, connectivity, and user experience. Wi-Fi 6E is a game-changing version of Wi-Fi that brings the technology to the 6 GHz frequency band. Past articles have outlined the technical differences between the IEEE standards known widely as Wi-Fi 5 (IEEE 802.11ac) and Wi-Fi 6 (IEEE 802.11ax), as well as the improvements made for Wi-Fi 6E. While Wi-Fi 6E is faster than previous versions (9.6 Gbps versus 3.5 Gbps on Wi-Fi 5), it isn’t all about speed. The real value of Wi-Fi 6 will be its ability to improve the network when many devices are connected.
When Wi-Fi 5 came out, the average U.S. household had an average of five Wi-Fi devices. Today, homes have nine Wi-Fi devices on average. Experts predict this number to jump to nearly 50 Wi-Fi devices within several years, according to the Organization for Economic Co-operation and Development. Wi-Fi 6 will alleviate the issues of connecting dozens of Wi-Fi devices on a single network. An essential feature of Wi-Fi 6E is that it lets routers communicate with more devices at once, send data to multiple devices in the same broadcast, and allows Wi-Fi devices to schedule check-ins with the router. In addition to being faster with more device capacity, Wi-Fi 6 can improve the battery life of devices while also having a better security protocol.
IoT is Fueling Wireless Growth
By 2025, it is predicted there will be 55.7 billion connected devices worldwide, 75% of which will be connected to an Internet of Things (IoT) platform. The wireless connectivity market is poised to reach US$157 billion by 2027, driven by wearable devices, smart home technology, and cloud service models, all working with IoT devices. While it has been challenging to meet the connectivity demands of IoT in the past, Wi-Fi 6 offers a potential solution. By extending Wi-Fi operation into the 6 GHz band, Wi-Fi 6 can support industrial IoT devices around the globe with high bandwidth, low power, and low latency capabilities.
Wi-Fi 6 and 5G Are Not the Same, But Work Together
It is important to note that some of the featured improvements of Wi-Fi 6 are similar to the emerging 5G cellular standard improvements. Though both standards employ some of the same features, they are different technologies (wireless LAN versus cellular) built for different uses. According to Network World, Wi-Fi is best suited for indoor applications in dense, high-volume environments. While Wi-Fi can work outdoors, 5G is designed to seamlessly offer cell phone coverage as you use your phone’s GPS while driving or check your email while on public transportation. As most smartphones will have both Wi-Fi 6 and 5G built-in, the two technologies will work together to support different use cases across industries.
Wi-Fi 6 Impact on Industry
Wi-Fi 6E extends the capacity, efficiency, coverage, and performance benefits of Wi-Fi 6 and offers incredible value to companies. With Wi-Fi expected to contribute nearly US$5 trillion to the global economy by 2025, more than 2.3 billion Wi-Fi 6 products and 350 million Wi-Fi 6E products entered the market in 2022. According to independent market research firms TechKnowledge Strategies and FeibusTech, Wi-Fi 6 and Wi-Fi 6E will offer more bandwidth, greater performance, and compelling user experiences:
- Public Wi-Fi: Venues and providers recognize the potential of Wi-Fi 6 and are working on next-generation applications. Demand is high for Wi-Fi 6 in public venues like airports, stadiums, university campuses, and high-density apartment complexes. Several pilot deployments of Wi-Fi 6 are addressing financial transactions at stadium settings, resolving incidents with minimum disruption at airports via Wi-Fi 6 security cameras, and making video calling smooth without buffering in public settings.
- Home: Wi-Fi 6 routers will improve wireless performance for many situations, including homes with smart home devices (like thermostats and security cameras) or older devices slowing the network, as well as households with streaming difficulties or many neighbors nearby, all of which will have their own routers and collections of devices. FeibusTech forecasts that Wi-Fi 6 will also spark a revolution in the smart home. Virtual assistants, like Amazon Alexa and Google Voice, could have far more processing power and storage available on Wi-Fi 6.
- Enterprise: Overall, the transition to Wi-Fi 6 in enterprise deployments is expected to be more of an evolutionary story. However, CIOs and other IT decision-makers who opt for full-spec Wi-Fi 6 solutions, such as Qualcomm’s Pro platform, can plan for up to 1,500 devices connecting effortlessly on a single access point. Several companies are getting into the arena early. For example, cloud-based applications like Skype and WebEx running on laptop and smartphone apps might have us saying goodbye to traditional desktop phones. Ruckus and Lenovo are making educational applications for students using VR goggles, where Wi-Fi 6 will be critical.
- Automotive: Wi-Fi 6 could be used to revolutionize the automotive market. For autonomous cars, vehicle-to-vehicle communication could be used to prevent accidents and speed up stop-and-go traffic. Likewise, vehicle-to-infrastructure can improve traffic flow at stop lights. In-car entertainment will get a boost from both Wi-Fi 6 and 5G. This combination will offer real-time responsiveness for streaming. Additionally, automobile dealers will be able to connect wirelessly to vehicles’ onboard diagnostics as customers enter the service area. This would help cut wait times and increase the capacity of the service department.
Preparing for Wi-Fi 6— Are You Ready?
Wi-Fi 6 will bring immediate benefits in network speed, capacity, and responsiveness to the global market. Such benefits will allow for new applications in virtually every segment.
Learn more in IEEE 802.11ax: An Overview of High Efficiency Wi-Fi (Wi-Fi 6) Part One and Part Two. Join us for this live virtual course program on 21 and 22 February from 12-3pm ET. It will provide an overview of the features and optimizations introduced by IEEE 802.11ax to the physical and medium access control layers. Purchase this course program by 17 February for the opportunity to ask questions and interact with the instructors.
Can’t make the live sessions? Purchasers will have access to the on-demand version of the course program. See more details>>
Resources
Cisco. (2022). 5 things to know about Wi-Fi 6/6E and Private 5G. Cisco.
Kastrenakes, Jacob. (21 February 2019). Wi-Fi 6: is it really that much faster? The Verge.
Research and Markets. (28 November 2022). Wireless and Fixed Connectivity Market Report 2022. BusinessWire.
Robinson, Kevin. (21 March 2022). Wi-Fi 6 and Wi-Fi 6E: The key to IoT. Wi-Fi Alliance.
TechKnowledge Strategies. (2019). Wi-Fi 6 Industry Impact Report. Qualcomm.
Telecom. (10 November 2022). Value of Wi-Fi. Wi-Fi Alliance.
Weinberg, Neal. (24 May 2022). What is Wi-Fi 6 (802.11ax), and why do we need it? Network World.

Contracts have long created headaches for the business community. Traditionally authorized by third parties such as banks and courts, business contracts can be expensive and time consuming, in addition to often ending in disputes — or even lawsuits. However, blockchain technology and the Internet of Things (IoT) could allow for “smart contracts” that eliminate the need for third parties in order to make contracts far easier and less expensive.
How Do Smart Contracts Work?
Unlike traditional contracts, smart contracts exist as unalterable digital code on the blockchain, a decentralized digital ledger of transactions that records data in a way that prevents hacking and altering of data by duplicating transactions and dispersing them to “nodes” across the network. Furthermore, the physical goods associated with these contracts, such as shipping containers, can be automatically traced with IoT devices and sensors, making them easy to trace and document.
After conditions are met between the various parties involved, the smart contract automatically executes, and begins next steps in the process. Because everything in the contract exists as code, it eliminates potential for human error and added fees. And since the terms are all predetermined and automatically enforceable, they cannot be manipulated or misinterpreted.
What Are The Benefits of Smart Contracts?
As we discussed in a previous post, this seamless integration of contracts could revolutionize the way businesses operate. There are many ways smart contracts will improve businesses in the future. According to the legal site JDSUPRA, these include:
- Automation: Smart contracts will allow businesses to automate the contract process, and trigger next steps without any human interference. “They can also send notifications and automate processes such as dispute resolution, document reconciliation, and discrepancy identification.”
- Risk management: Smart contracts eliminate the possibility for mistakes often made in the process of drawing up big contracts in which many conditions have to be met, and save time in the process. Instead, both parties agree on the release of payments once certain milestones are met. “This way, the service provider has incentive to make sure they maintain the agreed upon schedule and the paying party can have assurance they will not have to pay for work that has not been completed.”
- Time and money: Smart contracts allow for seamless money exchange, so that costly and time-consuming bank transfers and direct deposits are unnecessary.
- Confidence: Businesses can rest assured knowing that smart contracts are securely tracked and recorded on the blockchain. This mitigates concern that terms of their contracts may have been altered before they were signed, as well as reducing the potential for disagreements and legal battles.
- Simplifies the job of human resources: Because smart contracts are traceable and seamless, they make it much easier for employees, businesses, and HR departments “to satisfy their obligations and comply with company policies and regulations.”
- Creates certainty: Because smart contracts leave “no room for interpretation,” they will help eliminate long negotiation periods, contract breaches, legal disputes, and disagreements over whether terms were met. “All parties can see the terms set forth in the code, whether conditions have been satisfied, and what dispute resolution process corresponds to each step of the contract. As a result, there is no doubt what will happen.”
Smart contracts do come with some potential pitfalls. Examples include the potential for flawed code or data, and the inability of parties to reverse any mistakes made in the original contract once it is initiated. With smart contracts, there is simply no room for error of ambiguity. However, given their vast benefits, there is little doubt that many organizations will eventually adopt smart contracts.
Enterprise Blockchain for Your Industry
What industries can benefit from blockchain technology? Get Enterprise Blockchain for Healthcare, IoT, Energy, and Supply Chain, a five-course program from IEEE, to find out. Developed by leading experts in blockchain technology, this advanced program provides business use cases across key industries and sectors. It’s ideal for managers, professional engineers, and business leaders.
Contact an IEEE Content Specialist to learn more about how this program can benefit your organization.
Interested in getting access for yourself? Visit the IEEE Learning Network (ILN) today!
Resources
(14 July 2021). 6 Reasons Why Employers Need to Join the Blockchain Revolution and Consider Smart Contracts. JD SUPRA.
With the booming Internet of Things (IoT) device market, many people expect to be connected at all times. While it is unrealistic to be online 24/7 with no drops in coverage or speed—especially while travelling—losing connection can be a significant problem for organizations.
Businesses rely on devices and technology such as Wi-Fi and the cloud to remain connected to their data and customers. However, what happens when a business cannot connect? If employees are unable to even check their email inboxes, will productivity grind to a halt?
A possible solution that could help create a permanent connection for IoT devices involves sending data over sound. While this solution involves newer data-over-sound technology over the air, transmitting data via sound is an established practice. The characteristic whines and beeps of the dial-up modem was a form of data-over-sound using wires rather than over the air.
What is Data-Over-Sound?
Companies have been investing in new ways of transmitting data through their devices to ensure they are always securely connected. Sound waves would allow devices to interconnect without the use of Wi-Fi or Bluetooth. The evolution of data-over-sound technology has the real possibility to create network-independent IoT environments with uninterrupted connectivity.
Who Offers Data-Over-Sound?
Organizations that are currently working on data-over-sound solutions include Sonarax and Stimshop. Sonarax, an ultrasonic communication technology company, revealed its new standard in machine-to machine (m2m) connectivity. It enables devices to communicate with one another via sound waves. The protocol is the most extensive global infrastructure install base, and it operates on any device that has a built-in speaker or microphone.
Sonarax’s solution addresses three main areas:
- Ultrasonic Payments: Helping create secure connections for mobile payments and contactless ATM interaction. Pilot programs for this feature have been deployed at major global financial institutions.
- Ultrasonic Authentication: Providing a safe identification solution that can be integrated and used by any third party application.
- Ultrasonic Indoor Positioning: Allowing indoor positioning in buildings, such as shopping malls and hospitals, where GPS stops working. Sonarax is working to implement its technology for novel indoor navigation functionality at a later date.
Stimshop, an agency in France, offers data-over-sound technology via its protocol Wi-Us. Stimshop’s Wi-Us technology can turn speakers or sound systems into a vehicle for wireless communication, detection, authentication, and geo-location. The company also states that its technology can be used in environments incompatible with radio waves such as explosive environments or those with electromagnetic scrambling issues.
Security Concerns
What are the security concerns when it comes to transferring data via sound? Experts worry that there are apps that can acquire the information sent through the sound waves.
However, Sonarax CEO Benny Saban states that over-the-sound verification between two devices restricts man-in-the-middle (MITM) attacks. This type of attack involves hackers trying to interfere with the communication between two devices.
“As in all communication protocols, encrypted data is converted to ultrasonic data and reaches its destination–unchanged–through the same encrypted method by which it was sent,” says Saban. “Essentially, the ultrasonic communication protocol adds an additional layer of security to the first layer of encryption. This means that in order to hack the data, one needs to intercept the sonic data, decipher it, and then decipher the encryption used.”
Preparing for Evolving IoT Technology
Find out what new IoT developments could impact your industry. Prepare your organization with the IEEE Guide to the Internet of Things, a series of eight training courses led by top researchers in the field. This program is designed for professionals working in engineering, IT, computer science, and related disciplines across all industries.
Connect with an IEEE Content Specialist and receive a custom quote for your organization today.
Resources
Chandler, Simon. (18 October 2019). How Data-Over-Sound Will Ensure A Permanently Connected IoT World. Forbes.
(27 February 2019). Sonarax Unveils a Novel Ultrasonic Device-to-device Communication Protocol. PR Newswire.
(10 January 2018). When Wi-Fi Won’t Work, Let Sound Carry Your Data. Wired.
Stimshop Mobile Interactions and Data Transfers. Stimshop.
Edge computing improves the way businesses collect and analyze their data by processing information near the source as opposed to in the cloud. It provides real-time information, which allows companies to make data-driven decisions. Analyst predict that by 2024, the global edge computing market will rise to $9 billion USD. However, only 56% of networking professionals currently have plans to integrate this form of decentralized computing into their organizations, according to the IDG 2018 State of the Network.
As the technology improves, more companies are exploring edge computing capabilities. So how can your organization get a head start on the integration process?
Steps to Integration
Some helpful steps for organizations looking into edge computing include:
Step 1: Virtualize
Updating your infrastructure with virtualized machines can improve reliability, manageability, and create a solid foundation for edge integration. Besides these immediate benefits, transferring workloads to virtual machines should help simplify a future edge integration.
Step 2: Operational Technology (OT) and Information Technology (IT)
Many companies with separate Integrating Operational Technology and Information Technology are now seeking to bridge the gap. Because they possess dual skill sets, Hybrid OT and Industrial IT specialists may provide greater performance, productivity, agility, and cost-efficiency.
Step 3: Choose a vendor
The total cost of ownership, deployment, management, downtime risk, and operational efficiency are all key factors when selecting an edge computing solution. Be sure to do your research. Before selecting a vendor that works well with your organization, you should consider where the platform will be installed. The physical environment as well as the distance between the location and where the data is collected will likely impact your decision.
Step 4: IIOTint
Industrial Internet of Things (IIOT) devices use smart sensors to collect and analyze data instantaneously. This data allows industrial devices to make decisions and act on them, which optimizes quality, workforce, and engagement.
Step 5: Security
Increased interconnectivity also increases security vulnerabilities. Security risks include software hacks and system manipulation— both of which can cause breaches in customer data and bring operations to a standstill. Investing in cybersecurity and IIOT systems that provide regular monitoring and detection in the event of malware infection is crucial to keeping your information safe.
Benefits of Edge Computing
Staying up and running: Edge computing can benefit many industries, especially those that operate remotely. Because retail companies generally have more than one location, edge computing works well from both point of sale and security perspectives. Like retail companies, financial institutions, including banks, also have multiple branches and can benefit from edge computing.
Quick processing: The Internet of Things provides massive amounts of data. Because the data generally needs to be analyzed instantly in cloud applications, communication must be fast in order to be efficient.
Cost savings: Edge computing can reduce organizational costs by using smaller deployments. This helps businesses avoid building infrastructure at every site.
Getting Up to Speed
Prepare your organization for edge computing integration. Designed to train your entire team to support edge computing, IEEE Introduction to Edge Computing is an online five-course program. The on-demand courses included in this program are:
- Overview of Edge Computing
- Practical Applications of Edge Computing
- Research Challenges in Edge Computing
- Designing Security Solutions for Edge, Cloud, and IoT
- Tools and Software for Edge Computing Applications
To learn more about getting access to these courses for your organization, connect with an IEEE Content Specialist today.
Interested in the course for yourself? Visit the IEEE Learning Network (ILN) to learn more.
Resources
(23 August 2019). What Is Edge Computing? Forbes.
(16 September 2019). The analyst projects the global edge computing market to grow from USD 2.8 billion in 2019 to USD 9.0 billion by 2024, at a Compound Annual Growth Rate (CAGR) of 26.5%.Yahoo! Finance.
Conboy, Alan. (17 September 2019). What’s next for the Internet of Things? Going to the edge. IoT News
(16 September 2019). Five steps to successful edge integration. It Web.
Smart grid technology is enabling the effective management and distribution of renewable energy sources such as solar, wind, and hydrogen. The smart grid connects a variety of distributed energy resource assets to the power grid. By leveraging the Internet of Things (IoT) to collect data on the smart grid, utilities are able to quickly detect and resolve service issues through continuous self-assessments. Because utilities no longer have to depend on customers to report outages, this self-healing capability is vital component of the smart grid.
Smart Grid Management of Renewable Energy
The relationship between the smart grid and renewable energy revolves around gathering data. For example, wind farms use mechanical gears that require each link to support multiple sensors. Each sensor is able to note current climate and environmental conditions. This information is then quickly sent though the grid to alert the utility of any issues, which improves both the quality of service and safety.
“You’ve got this story of this invisible, dangerous commodity that travels at the speed of light that we call electricity and for the last hundred-plus years most people could interact with it in only the most rudimentary ways,” says Mark Feasel, vice president of smart grid for Schneider Electric. Companies are now deploying much more advanced sensing devices. According to Feasel, some devices can continually capture information on electricity up to 60,000 times per second.
Semiconductor materials, such as silicon, are supporting the creation of green energy with smart grid technology. Due to their ability to hold millions of minuscule transistors, these materials have enabled IoT advancement. In turn, this advancement has allowed the smart grid to link up devices throughout the system, which ensures that the supply of energy is equal to the demand. It also keeps the current evenly distributed.
Smart grids equipped with parts made from semiconductor material reduce the usage of electricity. For example, electric vehicles can charge at night— a time when offices and homes are not typically using much electricity. Lights switches and furnaces can also automatically power on and off. In this way, energy usage becomes “smart” by not using more than what is needed.
Renewable Energy with Smart Grid Technology Initiatives
As smart grid technology becomes more promising, both local and federal governments are exploring potential grid improvements.
Thailand
By 2037, Thailand wants a third of its energy to be generated by renewable energy sources. This means that Thailand’s grid will need to be modernized to handle the varying levels of energy provided by renewable sources. Any modernization plans will also need to take the country’s growing demand for electric vehicles (EVs), which is predicted to grow in coming years.
“When we have more renewable energy, the grid will become more difficult to manage, and then we will need to give them more flexibility with the digital to make it smarter,” says Dr. Surat Tanterdtid, Chief of Enterprise Architecture of the Electricity Generating Authority of Thailand. Smart grid technology can help monitor and predict the supply of renewable energy into Thailand’s grid. This may allow the country to anticipate power outages and prepare accordingly.
New York
The New York State Energy Research and Development Authority is currently holding a competition in order to improve the state’s energy distribution. The Future Grid Challenge, which began in July, is part of a push to transition the state’s electric grid to renewable energy. A new statewide act includes requirements for a clean or carbon-free electricity sector by 2040 as well as an 85% greenhouse gas emissions drop by 2050.
The first round of funding will provide up to $6 million USD to projects that partner with Con Edison and Orange & Rockland Utilities. The goal of the competition is to improve data analytics, grid stability, and forecasting while reducing system losses.
Modernizing the Smart Grid
One of the biggest frontiers in electrical engineering today is the development and implementation of smart grid technology. Fueled by the global demand for greener technologies and alternative fuels, environmentally-friendly smart grid technology has the ability to stimulate stagnant economies as well as change the way power is delivered to electricity consumers around the world.
Modernizing the Smart Grid is a four-course program designed to get you and your team up to speed quickly on the latest smart grid technologies. Learn more about how your organization can benefit from this IEEE course program today!
Resources
Pilkington, Ben. (4 September 2019). The Role of Semiconductors in Clean Energy. AZO Clean Tech.
Castagna, Rich. (29 August 2019). How Smart Grid Technology Is Driving Renewable Energy. IoT World Today.
Clemens, Ashley. (12 September 2019). New York power grid challenge is part of larger state energy goals. Daily Orange.
Basu, Medha. (19 August 2019). Thailand will use smart grid to predict outages. GovInsider.
Basu, Medha. (16 September 2019). How Thailand will integrate renewables and EVs into the grid. GovInsider.
With the constant growth of connected devices, as well as persistent phone and tablet use, traditional centralized networks may soon be overwhelmed with traffic. Gartner predicts that 25 billion connected devices will generate unprecedented amounts of raw data by 2021. This problem will demand next-level responsiveness and reliability— and it’s just two years away.
Edge computing promises to address the impending data surge with a distributed IT architecture that moves data center resources toward the network periphery.
Meeting Needs
Edge computing topology can reduce latency for time-sensitive applications, support IoT performance in low bandwidth environments, and ease overall network congestion.
- Latency: By virtue of physical proximity, time-to-action drops when data analysis occurs locally rather than at a remote data center or cloud. Because data processing and storage will occur at or near edge devices, IoT and mobile endpoints can react to critical information in near real-time.
- Congestion: Edge computing can also ease the growing pressure on the wide-area network. This can improve efficiency and keep bandwidth requirements in check This is a significant challenge in the age of mobile computing and IoT. Instead of overwhelming the network with a constant flood of relatively insignificant raw data, edge devices can analyze, filter, and compress data locally.
- Bandwidth: Edge computing topology can support IoT devices in environments with unreliable network connectivity. Such environments include cruise ships, offshore oil platforms, rural agricultural plants, remote military outposts, and ecological research sites. Even with a hit-or-miss connection to the cloud, local compute and storage resources can enable continuous operation.
Edge Challenges
The more intelligent an edge device, the more intensive its configuration, deployment, and maintenance requirements. Organizations will need to decide on a case-by-case basis if distributed computing benefits (like cheaper WAN connectivity) justify the increased overhead at the network’s periphery. Gartner Research Director Santhosh Rao cautions that the costs associated with deploying and operating edge computing technology can pile up quickly. Although edge computing comes with many benefits, IT leaders will have to make sure a they outweigh its costs.
Security is also a major concern associated with edge computing. Some IT professionals worry that a decentralized computing architecture will make a network more vulnerable to attack by creating excess backdoor entry points. However, other people argue that placing an edge-computing gateway between network endpoints and the internet can actually improve security. Because more data will be processed and stored locally, travel to and from the cloud will be reduced.
Despite uncertainties, analysts expect organizations will increasingly rely on edge computing technology in the years to come. According to Rao, just 10% of enterprise data was created and processed outside of a centralized data center/cloud in 2018. He predicts that number will climb to 75% by 2025.
Introduction to Edge
Prepare your organization for the future by training your entire team to support edge technology now. IEEE Introduction to Edge Computing is a new five-course program designed for organizations investing heavily in edge. Courses include:
- Overview of Edge Computing
- Practical Applications of Edge Computing
- Research Challenges in Edge Computing
- Designing Security Solutions for Edge, Cloud, and IoT
- Tools and Software for Edge Computing Applications
Connect with an IEEE Content Specialist for access today.
Resources
Irei, Alissa. (Apr 2019). Understand why edge computing technology matters. SearchNetworking.
Jones, Nick. (Sept 2018). Top Strategic IoT Trends and Technologies Through 2023. Gartner.
Connected devices are transforming the world in ways we could barely have imagined just a few decades ago. The Internet of Things (IoT) is already changing industries and lives around the world. The following are just four industries that are experiencing this transformation:
Agriculture: IoT tractors are helping farmers increase productivity and decrease costs. These vehicles not only drive themselves, but also use algorithms to calculate the best routing based on things like number of vehicles and vehicle turn radius.
Education: So long, one-size-fits-all lectures! Thanks to IoT devices that enable task-based learning, students can work at their own pace via connected devices. The devices notify teachers when students need extra guidance. Wearable devices help teachers out, too, taking over tedious tasks like attendance taking.
Industrial Environments: IoT devices that combine historical records with real-time data to predict breakdowns and schedule preventive maintenance reduce downtime.
Healthcare: IoT is already improving care and delivering it to more people. The ability to remotely monitor patients’ vital signs reduces emergency room visits and helps people in rural areas avoid long and expensive trips to a medical center.
What’s Next
Find out what the IoT could have in store for your industry. Prepare your organization for the IoT now with IEEE’s Guide to the Internet of Things, a series of eight training courses led by top researchers in the field. This program is designed for professionals working in engineering, IT, computer science, and related fields across all industries. Connect with an IEEE Content Specialist and receive a custom quote for your organization today.
Resources
Podnar, Kristina. (25 Feb 2019). How to Protect Yourself from the Siren Song of Healthcare IoT. IoT for All.