IoT Report July15 1
IoT Report July15 1
OF THINGS
SHAPING OUR FUTURES
>>
[ CONTENTS ]
4 PREFACE
6 EXECUTIVE SUMMARY
APPENDIX
27 WORKSHOP PARTICIPANTS
×
[ PREFACE ]
Following a cross-disciplinary Workshop held in Cambridge
in September 2014 this report captures the views of
experts in the technology based disciplines and the social
and human sciences on the emerging technology known
as The Internet of Things.
July 2015
>>
4
[ SECTION ONE ]
>>
×
[ EXECUTIVE SUMMARY ]
The Internet of Things (IoT) is the name given to
emerging technologies based on advanced forms of
connectivity. This generally accepted definition is subject
to deeper scrutiny later in our report. These technologies
have the potential to benefit society and business by
improving the way in which resources are used. Well-
documented examples include the ability to make cities
more environmentally sustainable, safer and more
pleasant to live in. There is also the chance to broaden
the scope of healthcare services and to deliver them with
greater cost efficiency. Further benefits may be realised
through reducing the cost and time taken for everyday
transactions. But alongside the commercial benefits, the
IoT poses a clear risk to privacy and data security. If not
properly addressed, these risks will impede the take up of
the IoT and its claimed social benefits.
This report looks at the prospects for the IoT and at the
potential technological, economic and legal barriers to
its widespread adoption. It is based on background
research, interviews with technology professionals and a
workshop convened in September 2014 in the University
of Cambridge with a panel of experts from areas such as
the law, engineering, financial services and social sciences.
>>
6
[ TECHNOLOGY AND STANDARDS ]
Here we look at the current state of the technologies which define the IoT
and analyse potential barriers to their wider use and dissemination.
Technological innovation is not sufficient to drive IoT: two other ingredients
are vital. One is the need for interoperability, for devices to operate together
seamlessly. This may be built upon widely accepted technical standards. Such
standards take time to emerge and may require firms to share essential
technology. This type of standard setting involves a delicate balance of
cooperation and competition. This is often the case in the technology sector
as companies come together to agree a set of governing standards and then
diverge to create a differentiated set of products. Examples of this include
Wi-Fi and Bluetooth. We weigh up arguments for and against the view that
a common or open standard will be needed for the IoT to develop. We also
explore the economics underlying the IoT and the role governments can play
in encouraging its transition to a general purpose technology. The second
essential ingredient is the business model: who puts the IoT system together
and how do they make money from it? This involves analysis of the ways in
which firms are likely to position themselves as the technology develops.
7
[ TECHNOLOGY AND STANDARDS ]
8
[ TECHNOLOGY AND STANDARDS ]
THE NEED FOR A STANDARD In addition to cost, we also have to consider battery life
in IoT devices, especially those which are deeply
embedded, remote or difficult to access. However,
systems are being designed which can run on batteries
with a ten-year life or potentially be self-sustaining by
utilising energy ‘harvesting’ techniques. This
technology relies on the capture and storage of kinetic
energy produced by the device, or its surroundings to
re-charge the main battery. There may be other options
too where energy can be transmitted to a device
At present there is no single, generally accepted set of wirelessly. This is an interesting technology but there
standards which would permit connectivity on the are challenges because of the potential for energy theft
scale, and at the cost, needed to make the IoT fully and the need to ensure safety.
functional. But there are emerging standards for
networks which operate at both the local and wider
WHAT TYPE OF STANDARD IS NEEDED?
levels, using for example Wi-Fi, 3G or 4G (although Standards for a new technology do not always take the
these may turn out to be too costly), 6Lowpan and same form. A standard might be proprietary, that is,
CoAP. Companies such as ARM are making software owned by a company and licensed to others to use, at
available to help developers design devices to operate a cost to them. Or, a standard might be open, meaning
in this area. that other companies can use it to develop their
products to be compatible with this new standard.
LOW COST AND LOW ENERGY Sometimes, the evolution of technological standards
CONNECTIVITY presents companies with a dilemma. Firms which are
competing may decide not to cooperate on the
development of a common standard as it may confer
an advantage on a rival. This means companies are
likely to back the standards for which they own the
intellectual property rights (‘IPR’). In this scenario,
several standards for a technology might exist
simultaneously. It may be difficult to achieve
interoperability between these competing standards,
resulting in customers being channelled in to buying a
single company’s products.
Information being transmitted over an IoT network is A different outcome would be to follow the example of
likely to be different to that sent over a mobile phone how the internet has evolved, where there are various
network. A telephone call can involve transmitting fairly firms competing to offer browsing, search and so on,
complex data. In the case of IoT, the information may on the basis of a common basic set of protocols which
be extremely simple and could be transmitted at any define how the internet works. In this way a common
time of day or night. This gives us options in which IoT set of standards works for all and allows companies
data can be moved around a network, helping ease to differentiate their offerings while permitting
potential bandwidth issues and save cost. One idea interoperability.
being considered as part of the current work on
standards is how a way can be found of using the
available radio spectrum. This would be an ultra-
efficient option.
9
[ TECHNOLOGY AND STANDARDS ]
10
[ TECHNOLOGY AND STANDARDS ]
which assemble experts from around the world to to those which have arisen around the internet, which
develop technical norms, could develop the necessary make internet access appear cheap or free to most
set of standards. The ITU aims to set standards in ways people.
which to avoid market battles over preferred
But it is clear that IoT has the potential to realise a wide
technologies. It tries to help companies from emerging
range of social and commercial benefits. Once there
markets create a level playing field which provides
are clear payoffs, businesses will invest. In addition,
access to new markets. The ITU’s Global Standards
there is also a case for kick-starting public sector
Initiative on the Internet of Things attempts to promote
investment on the grounds that cleaner cities and
a unified approach for development of technical
better health outcomes, for example, entail wider social
standards for the IoT on a global scale.
benefits.
THE ECONOMICS OF
THE IOT AS A PUBLIC GOOD
TECHNOLOGICAL CHANGE
century or so ago, electricity was the outstanding Here, government can play a role by investing in cost-
example of this; today it is the internet. No longer saving technologies which will benefit public services.
simply a mode of communication, the internet provides When 30 per cent of cars are touring a town, searching
for online services which have proved enormously for a space to park, there are costs which are not
profitable for companies, redefined products and factored into commercial transactions. There is waste,
transformed markets, as well as bringing benefits to in terms of space used, pollution, health and
consumers and users. The technology itself did not commuting time, which fall on the community.
change to enable these services to be provided; the use Potential ways to improve public order, such as sensors
of the technology changed. The internet now allows that react to disturbances, switch on street lights and
for free emailing, websites and cloud services, alert local patrol cars, are of benefit to citizens at large
alongside novel combinations of technologies such as rather to than private business. Analysis of data on a
the use of GPS with internet mapping applications. community scale might allow local government to
What are the comparable general purpose applications improve services, such as rubbish bin collections which
of the IoT? could be timed for when bins are full. It is unlikely these
At present, the IoT is not comparable with the internet. uses will generate enough commercial profit for
The IoT cannot yet produce the general purpose, free companies to invest in the necessary infrastructure. But
use applications of the internet. We do not know what these uses are socially just as valuable and their
business models might arise around the IoT, comparable implementation is a matter for public policy.
11
[ TECHNOLOGY AND STANDARDS ]
>>
12
>>
13 >>
[ PRIVACY AND DATA PROTECTION ]
THE VALUE OF DATA FOR THE IOT THE IOT AND DATA PROTECTION LAW
The IoT could bring significant social benefits as well as Data protection law only applies to personal data. This
providing new opportunities for wealth creation. is data about an individual and from which that
However, it also carries significant risks in the use of individual can be identified. Data protection law applies
personal data. In some instances the value of an IoT when this data is processed and controlled by someone
application is in the ability to commercialise the data other than the data subject. A data controller is one
being collected. Personal data can be combined with who makes decisions about how that data should be
other data to create ‘big’ or ‘meta’ data, which would processed, and for what purposes. Where personal
be sold on for commercial use. There is a danger that data is sent to and processed or controlled by another
the IoT will generate business models dependent on agent, such as a company or a search engine (these
the erosion of privacy. could be joint controllers), or transmitted on a wide
range, possibly accessible to others, there could be
There are two possible negatives here for the IoT. One
breaches of data protection law.
relates to public opinion: if the IoT is associated with
an invasion of privacy and a loss of control of personal An important component of the legal framework for
data, it will face significant political and reputational companies collecting personal data is obtaining consent
obstacles. The second concerns the framework of data from the data subject. Consent can be given by the
protection law: the harvesting of personal data is not data subject to a company to process data for a specific
permitted by data protection laws of the kind which purpose. In the UK, this consent can currently take the
operate in certain regions of the world, most notably form of agreeing to the terms and conditions set out
the European Union, and which have the potential to in a standard term contract. However, serious doubts
impose legal and regulatory costs on firms wherever have been raised about the fairness of existing standard
they operate. terms, and the European Union is considering limiting
the scope for this form of consent by requiring that
Possible answers to these dilemmas lie in a conjunction of
agreement to the use of personal data be given
evolving regulation and technical change designed to
explicitly. The processing of sensitive personal data, for
allow consumers and citizens to control their own data.
example concerning medical records or political or
WHEN IS PRIVACY AN ISSUE? sexual orientation, already requires explicit consent
If we define the IoT as an internal system, data from the data subject.
protection is not an issue: for example, a domestic In many contexts the commercial value of data can only
system, such as one in which sensors on the solar be fully unlocked once it is shared. If it remains in
panels transmit information to a home hub which separate silos and is not combined with other data, its
instructs a washing machine to start a wash cycle, does commercial value is reduced. One possible development
not compromise privacy because data does not leave in the IoT will be to plug systems together, so they can
the system and is controlled by the owner of the data communicate when transferring data, and send all this
through an interface. Even if data were sent to a cloud data to a cloud server. But once data is shared in this
from the home hub, this is no different to how data is way, data protection becomes more complex.
stored today, so it is not an issue specific to the IoT.
Unless that data is sent to a company’s database, or
accessed by anyone other than the owner of that data,
data protection is not relevant. However, this case does
not exhaust all possible uses of the IoT.
14
[ PRIVACY AND DATA PROTECTION ]
HOW MUCH OF THE DATA PROCESSED these could be combined, so any regulation permitting
THROUGH THE IOT WILL BE PERSONAL anonymous data to be processed would be difficult to
DATA? enforce.
15
[ PRIVACY AND DATA PROTECTION ]
be forgotten. This applies where the information LITIGATION RISKS AND SOCIAL COSTS
is inaccurate, inadequate, irrelevant or excessive OF PRIVATE LAW CLAIMS: ‘STEER CLEAR
for the purposes of the data processing. OF EDGES’
The European Commission has also proposed a
modernisation of data protection law, aimed at
improving the ability of individuals to control their own
data. Among other things, it would require individuals
to have effective access to their own data and a right
to move it from one service provider to another. The
Commission’s proposals also contemplate a significant
strengthening of administrative and judicial remedies
for breach of data protection law.
16
[ PRIVACY AND DATA PROTECTION ]
It must be remembered, though, that many of these natural brake on the misuse of meta data. It also suggests
issues already arise in the context of product liability that there should be different standards of security and
claims arising from the manufacture of diagnostic protection for data stored at different levels. At the
equipment. The IoT, in itself, may bring nothing new to lowest level, that is, the level on which data was first
the story, and existing legal solutions may be able to collected for a specific purpose, general standards of
cope with any increase in claims as new technologies protection would apply, with stricter standards to be
are tried out and bed down. met before transfer to the next level is permitted.
Regulation and litigation in the domain of privacy have
TECHNOLOGICAL SOLUTIONS TO
often been responses to sensational events, and it is
DATA PROTECTION
hard to predict what may drive legal change in future.
Technology companies will tend to develop business
models which ‘steer clear of edges’ where the law is
unclear, in order to avoid potentially catastrophic
litigation risks. Companies also have an incentive to
develop systems providing for ever more vigilant
control of personal data, to stay one step ahead of
legal developments.
17
[ PRIVACY AND DATA PROTECTION ]
18
[ PRIVACY AND DATA PROTECTION ]
not? What redress do I receive if the data has been (ii) Your contracting party or a third party will use
processed for a purpose not specified, or given to a your data to inform you of other similar
third party without consent? products/services, and a variety of different
products/services based on an inference about
A problem in providing simplified terms for consumers
your life style.
is to find out which of these approaches makes most
sense to consumers, while allowing data to be used to (iii) Your contracting party or a third party will use
drive economic growth and to realise the wider societal your data to generate a profile about you,
benefits of technological change. including predictions of situations in which you
might want to know about a variety of different
NEW APPROACHES TO TERMS AND services.
CONDITIONS FOR DATA USE
(iv) Your contracting party or a third party will make
In drawing up a new approach to terms and condition
best efforts to keep your data anonymised so
(‘Ts and Cs’) it may helpful to distinguish between certain
that it can be used for a variety of marketing or
key uses of data. There may be two broad use scenarios:
social policy analysis.
(i) Consumer as target: this is where the aim of
(v) Your contracting party or a third party will not
assembling and analysing data about a consumer
use your data for any other reason.
is to offer them additional products or services.
In future, options of this kind could form the basis for
In some cases these offers will be directly linked
obtaining consumers’ informed consent about data
to an action a consumer has taken online, for
usage.
example, researching specific products or
entering into a specific contract. In some cases Some argue that there is also a need for companies to
it may be the result of drawing inferences, for offer opt in and opt out clauses, including the option
example, about a consumer’s lifestyle on the to leave and delete all personal data held. Such exit or
basis of various sources of information. data portability clauses might become necessary to
comply with new EU regulations. Portability would
(ii) Consumer as topic: this is where the primary aim
need to work so that a user would have the right to
of analysing data is to generate a ‘conversation’
move their profile from a social networking site, for
about the consumer.
example, and delete all personal data, while also being
This covers situations where, without the able to interact with this site by sharing data on a
consumer’s permission, health data is sent to an temporary basis from a new social networking site.
insurer or employer, or financial data goes to a
Some form of third party certification of best practice
mortgage company or employer. It also includes
in this area could help provide consumer confidence.
particularly difficult situations where data is used
Some advocate a body funded by industry, with powers
to make sensitive ‘predictions’ about a consumer’s
of enforcement and redress, as the best way to take
health, for example, or to categorise consumers
this forward.
in ways they may not approve of.
19
[ CONCLUSION: THE WAY FORWARD FOR THE INTERNET OF THINGS ]
The IoT has the potential to transform society for the better. It also presents new
opportunities for businesses to emerge and prosper. Whether the IoT develops sooner
rather than later, and how far it promotes the public good, will not be determined by
the technology alone. Firms need to find ways to collaborate on protocols and
standards which will cut costs associated with the IoT. They should also be building
consumer trust around issues of privacy and security associated with the IoT.
But while there is much that business can do, the IoT affects people as citizens and
not simply as consumers. Thus there should be civil dialogue and debate around the
implications of the IoT. Government has a role in stimulating this debate and
encouraging firms and industry bodies to come up with solutions to privacy and
security issues. The legal system must ensure that privacy rights are respected but
should also encourage experimentation over terms and conditions for data use which
can help address public concerns.
An active and engaged civil society, an effective government which knows its limits but
can intervene effectively when needed, and a flexible legal system, are among the
conditions needed for the IoT to realise its full potential.
20
>>
[ SECTION TWO ]
>>
TWO VISIONS OF THE IOT: THE IOT AND THE ONTOLOGY
MUNDANE AND USEFUL, OF TECHNOLOGY
OR SOCIALLY TRANSFORMATIVE? An emerging research field combining elements of
There are two visions of the emerging technology philosophy and social theory, the ontology of
known as the Internet of Things. technology, helps us to understand the wider societal
One is that it is a fairly mundane but useful solution to context of the IoT and to understand why its impact is
everyday problems, such as the allocation of car likely to be profound. Ontology concerns itself with
parking spaces, but with a restricted use of data which fundamental features of a domain, such as technology,
would remain with the institution and on the level it is and how entities fit into social structures. A structure
first collected. could consist of a collection of rules, duties or policies.
The entities could be people, groups, devices or objects.
The other is of a much more wide-ranging and life
These entities may be associated with particular
changing technology which might also involve the
functions and uses. The point of this conceptualisation
sharing of data on a huge scale. This second vision of
of technology is that when an entity is removed, the
the IoT as a transformative technology may not be
space it occupied lingers in society’s imagination. In
entirely positive and not everyone will receive it with
other words, a space for this technology remains present
unquestioning optimism.
at the level of human consciousness and awareness,
In this section of our report we consider the wider and this may bring about a substitution effect, as the
societal and philosophical implications of the IoT. connections or functions or an understanding of the
22
particular objects. Rather it will involve the mapping of Artificial Intelligence. Professor Stephen Hawking the
an understanding of one set of functions or connections English theoretical physicist, cosmologist, author and
on to something new and unfamiliar. There may be a Director of Research at the Centre for Theoretical
crucial period of time when society’s expectations are Cosmology within the University of Cambridge has
geared towards something new. In this period, there spoken of the need to think through the implications
may be many competing notions of new technologies, for society of AI and has raised concerns about
which struggle for acceptance. machines taking over from people even predicting “the
Until recently the Uber taxi booking service which allows end of the human race as we know it”. However, this
users to order a taxi through their mobile phones at is hotly contested by other experts in the field such as
cheaper rates and then give drivers feedback on their Cambridge Computer Scientist Ben Medlock who is
journeys, has been undercutting the traditional pricing looking at how software can understand nuance in
structures of traditional licensed taxi firms and hailed as language. He has said: “We dramatically underestimate
a success. It was used to illustrate what new smart the complexity of the natural world and the human
phone technology could achieve for its customers but it mind. Take any speculation that full AI is imminent with
is now becoming extremely controversial throughout a big pinch of salt.”
the World. Uber has been ordered to stop operating in After Google acquired the British AI firm DeepMind in
Spain, after a series of protests by taxi associations, and January 2014, it set up its own ethics committee to
a Judge there has said the Uber drivers don’t have examine how this technology is used. DeepMind’s
official authorisation and accused the service of unfair founder Demis Hassabis told journalists that he only
competition. The app’s ranking system has been criticised agreed to sell his firm to Google on the basis that his
for institutionalising means of discrimination through the technology would never be used for military purposes
preselection of both drivers and passengers. Further, but that decision now rests with Google’s own ethics
the company’s so-called “God view”, which enables it committee and commentators have pointed out no-one
oversight of a vast network of city transportation, raises really knows how this technology will ultimately be used.
concerns about privacy, autonomy and security.
This marginalisation of the human agent in machine to Those advocating this view argue that it is worth giving
machine communication is currently leading to a up prevailing notions of privacy in return for the gains
healthy societal debate about the future of AI – which the IoT will bring. There may be added security
23
in monitoring residential properties remotely. Devices in As we have seen (section 1 above), there may have to
cars or computers might prevent theft by communicating be a recognised standard before the IoT is introduced
to the owner if there is any movement. Privacy, they fully into industrial manufacturing supply lines. This may
argue creates negative as well as positive environments. slow things down. Engineers design machines which
If a camera or recording device is linked to IoT will not work if designed to conflicting standards, while
technology, people can be alerted when needed: police there are health and safety issues once software and
to disturbances; health workers to elderly patients; technology are added into actual machines.
human resource managers to inappropriate language
But even if the full manifestation and consequences of
in the workplace. The IoT could potentially help to
the IoT are not just around the corner, the path we
deliver better health services, and to use energy resources
choose to follow today matters, because each choice
more effectively.
will constrain the subsequent set of options, and we
A DARK SIDE TO TRANSFORMATIVE could end up in a society that is radically altered. For
TECHNOLOGY: CAN SOCIETY CHOOSE? the time being it is possible to raise concerns over the
Allied to this view is the claim that the IoT will render direction of the development of the IoT, but this
privacy irrelevant whether we like it or not. But a window may soon close.
countervailing view is that technology is not independent
of law and politics. One of the prevailing narratives of
our time is technological determinism. This usually
begins with a vision of the transformative benefits
technology will provide to society without addressing
potential downsides. Yet it is too often assumed that
these downsides will resolve themselves, and that
anyone who takes them seriously is a technophobe. In
practice, there is still space for human choice to be
exercised over the future of the IoT. The IoT could
develop in away which places it beyond political control,
but we are not at stage yet. There is still time for a
meaningful debate to take place over the governance
of the IoT at local, national and global levels.
TECHNOLOGY AFFECTS
THE TIMETABLE OF THE IOT DEMOCRATIC RIGHTS
There are currently vending machines all over the world Will it be possible to opt out of this new world? With
which communicate with a central control to indicate the internet, we have the option to connect or not to
whether they are empty or not; this is already a globally connect. But consent to participation in the internet is
used form of the IoT. We also have smoke detectors already ambiguous. Is it possible to fulfil our obligations
which communicate directly with emergency services. So as citizens without access to the internet? There are
one form of the IoT is already here. However, this is not already discounts and benefits such as extended
the IoT as it might be defined in the future, in that it does deadlines to those who pay or fill in forms online. There
not involve sending a message from device to computer are already disadvantages for those who do not. We
to control another device. Industry experts predict that have online voting. Does an offline existence allow for
in five years from now, all Chinese manufacturers of active participation in certain elements of society? Is it
washing machines will install sensors to enable these socially acceptable to live offline? Can we rely on
machines to automatically download software which can receiving an invitation by post? There are also specific
advise on various wash cycles. This would involve a two cases where consent is not given. Whereas there is at
way communication system between the washing least some semblance of a private contract between a
machine and a central database or computer system. user of gmail and Google, a non-gmail user who sends
24
an email to someone else’s gmail account cannot CONCLUSION – SOCIETY AND THE IOT
prevent the Google server accessing the content of that
communication.
25
[ APPENDIX ]
INTERNET OF THINGS
WORKSHOP PARTICIPANTS
>>
University of Cambridge Public Policy Strategic Research Initiative and Centre for Business Research
LIST OF PARTICIPANTS
We would like to thank all our Internet of Things Workshop participants for their contributions to our
Workshop and related discussions.
1. Ross Anderson, Computer Laboratory, cryptography and internet security
http://www.cl.cam.ac.uk/~rja14/
2. ARM – Krisztian Flautner, Stephen Pattison, Kerry Maguire
http://www.arm.com/
3. Ian Brown, Cyber Security Centre and Senior Research Fellow at the Oxford Internet Institute
http://www.oxfordmartin.ox.ac.uk/people/516
4. David Connell, Venture Capitalist Researcher
http://www.cbr.cam.ac.uk/about_us/connell_david.htm
5. Simon Deakin (co-chair)
http://www.cbr.cam.ac.uk/about_us/deakin.htm
6. Tom Dougherty, Philosophy (political), University of Cambridge
http://www.phil.cam.ac.uk/news/dougherty
7. Phil Faulkner, Economics (philosophy of technology), University of Cambridge
http://www.jbs.cam.ac.uk/faculty-research/fellows-associates-a-z/philip-faulkner/
8. David Feller, Research Associate, Centre for the History of Science, Technology and Medicine,
University of Manchester
9. David Howarth (co-chair)
http://www.law.cam.ac.uk/people/academic/dr-howarth/90
10. Francois Meunier, Morgan Stanley, Industry Analyst
http://www.machinetomachinemagazine.com/francois-meunier-morgan-stanley/
11. John Naughton, The Observer, Open University, Cambridge University
http://www.wolfson.cam.ac.uk/people/professor-john-naughton
12. Michael Pollitt, Economist, Cambridge University
http://www.jbs.cam.ac.uk/faculty-research/faculty-a-z/michael-pollitt/
http://www.energy.cam.ac.uk/directory/[email protected]
13. Julia Powles, Intellectual Property Lawyer, Cambridge University
http://www.law.cam.ac.uk/people/research-students/julia-powles/4273
14. Jatinder Singh, Senior Research Associate Computer Laboratory, University of Cambridge
http://www.csap.cam.ac.uk/network/jat-singh/
15. William Webb, computer science and engineering, protocols
http://www.csap.cam.ac.uk/network/william-webb/
CEO of the Weightless Special Interest Group (SIG)
http://www.weightless.org/blog/author/william-webb/
16. Carolyn Twigg (Researcher and Coordinator for this project); Charlotte Sausman (SRI Public Policy
Research Co-ordinator); Boni Sones (Policy Associate, CBR), Graham Copekoga, (Photographer).
27
THE INTERNET OF THINGS
SHAPING OUR FUTURES
01223 765320
www.cbr.cam.ac.uk