0% found this document useful (0 votes)
34 views1 page

In 2

The lecture emphasized the significance of latency in data transmission, particularly for systems like smart power stations that require quick responses. It also highlighted security and privacy challenges associated with IoT devices, which are often vulnerable to attacks. The growing number of connected devices increases risks, as illustrated by the 2016 Mirai botnet attack that exploited everyday IoT devices.

Uploaded by

Tolicho
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views1 page

In 2

The lecture emphasized the significance of latency in data transmission, particularly for systems like smart power stations that require quick responses. It also highlighted security and privacy challenges associated with IoT devices, which are often vulnerable to attacks. The growing number of connected devices increases risks, as illustrated by the 2016 Mirai botnet attack that exploited everyday IoT devices.

Uploaded by

Tolicho
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

In the lecture, one of the topics that really stood out to me was latency.

It means the time it takes


for data to go from one place to another and for something to happen in response. I found this
issue important, especially for systems like smart power stations where things need to happen
quickly and without delay. According to [5], “The low-latency edge IoT agent device... performs
nearby processing of massive intelligent electricity data to avoid the bottleneck of
communication channel caused by massive data transmission.”

In the lecture, security and privacy are mentioned as challenges. I found this part very important
because it connects not just to IoT but also to many other areas in our daily lives. The lecture
notes explain that IoT devices are often weak in terms of protection.

From my side, I’ve also noticed that as more and more devices connect through IoT, the risks
keep growing. It’s like what we see in banking systems or healthcare. Once more data is shared
online, security becomes even more important. I searched online and learned about the 2016
Mirai botnet attack. Hackers used simple, everyday IoT devices like cameras

You might also like