Internet of Things (IoT)
IoT links sensors and devices to collect and exchange data, enabling automation and monitoring across industries, while requiring careful security and privacy design.
IoT comprises interconnected devices (sensors, actuators, gateways, and software) that generate data via connectivity protocols and can be managed remotely. Typical architectures combine edge/fog layers with cloud services to process streams, store telemetry, and orchestrate actions. Common IoT platforms support device provisioning, identity, policy-based access control, and end-to-end security. Communication happens over protocols such as MQTT, CoAP, AMQP, or HTTP(S), often using TLS or DTLS for transport security. Data is modeled, unified, and governed through event streams or time-series databases. Key security practices include secure boot, hardware-backed keys, mutual authentication, encrypted channels, secure over-the-air updates, and robust lifecycle management. Privacy considerations require data minimization, access controls, anonymization, and transparent data [governance](/uk/terms/data-governance). Standards bodies and interoperability efforts aim to harmonize data formats, APIs, and reference architectures to enable end-to-end trust and portability.
graph LR
Center["Internet of Things (IoT)"]:::main
Rel_edge_computing["edge-computing"]:::related -.-> Center
click Rel_edge_computing "/terms/edge-computing"
Rel_iot_security["iot-security"]:::related -.-> Center
click Rel_iot_security "/terms/iot-security"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 Простими словами
Generated ELI5 content
🤓 Expert Deep Dive
Generated expert content
❓ Часті питання
What is IoT?
IoT is a network of physical devices with sensors and connectivity that share data to enable automation and insights.
Which protocols are commonly used?
MQTT, CoAP, AMQP, and HTTP(S) are common; TLS/DTLS secures transport; authentication and identity management are essential.
How is security addressed in IoT?
Secure onboarding, device identity, encrypted communications, authenticated updates, and continuous vulnerability management are required.
What is IIoT?
Industrial IoT applies IoT to manufacturing and critical infrastructure, emphasizing reliability, safety, and deterministic performance.
How can privacy be protected?
Data minimization, anonymization/pseudonymization, strict access controls, and clear data governance policies are needed.