Has been around for quite a while, but only recently has become affordable for personal use
The Internet of Things (IoT) refers to the physical network included with various electronics sensors and software.
How it works
To collect and process the data to detect the changes in the physical status of things
To identify and track the data of things
To enhance the power of the network by devolving processing capabilities to different part of the network.
Risks to national infrastructure
Increasing threats of cyberwar
Challenges for IoT security
Threats based upon gaining physical access to IoT devices
Data and identity theft
IP theft, server/network manipulation
Enabling Data Security for the Internet of Things
Authentication and Key management
Challenges for provisioning services
Applications of IoT
Medical and Healthcare systems
Lee, I., & Lee, K. (2015). The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons, 58(4), 431-440.
Centenaro, M., Vangelista, L., Zanella, A., & Zorzi, M. (2016). Long-range communications in unlicensed bands: The rising stars in the IoT and smart city scenarios. IEEE Wireless Communications, 23(5), 60-67.
Farooq, M. U., Waseem, M., Khairi, A., & Mazhar, S. (2015). A critical analysis on the security concerns of internet of things (IoT). International Journal of Computer Applications, 111(7).
Dorri, A., Kanhere, S. S., Jurdak, R., & Gauravaram, P. (2017, March). Blockchain for IoT security and privacy: The case study of a smart home. In Pervasive Computing and Communications Workshops (PerCom Workshops), 2017 IEEE International Conference on (pp. 618-623). IEEE.
Zhang, Z. K., Cho, M. C. Y., Wang, C. W., Hsu, C. W., Chen, C. K., & Shieh, S. (2014, November). IoT security: ongoing challenges and research opportunities. In Service-Oriented Computing and Applications (SOCA), 2014 IEEE 7th International Conference on (pp. 230-234). IEEE.