Final Transcript

Total Page:16

File Type:pdf, Size:1020Kb

Final Transcript 1 1 2 3 4 5 6 7 FEDERAL TRADE COMMISSION 8 INTERNET OF THINGS WORKSHOP 9 10 11 NOVEMBER 19, 2013 12 13 14 15 16 17 Federal Trade Commission 18 601 New Jersey Avenue, N.W., Conference Center 19 Washington, DC 20 21 22 Reported By: Stephanie Gilley 23 24 25 2 1 FEDERAL TRADE COMMISSION 2 I N D E X 3 4 Session Page 5 Welcome, Karen Jagielski 3 6 Opening Remarks, Edith Ramirez 6 7 Paper Session 1: "What is the Internet 15 8 of Things?" 9 Paper Session 2: Contextual Privacy 35 10 Panel One: The Smart Home 52 11 Keynote Speaker, Vint Cerf 118 12 Remarks, Maureen Ohlhausen 154 13 Panel Two: Connected Health and Fitness 164 14 Panel Three: Connected Cars 235 15 Panel Four: Privacy and Security in a 292 16 Connected World 17 Closing Remarks, Jessica Rich 365 18 19 20 21 22 23 24 25 3 1 W E L C O M E 2 MS. JAGIELSKI: Good morning. I'm Karen 3 Jagielski and I'd like to welcome you to the FTC 4 workshop on the Internet of Things. And I have to 5 note that it is the 150th anniversary of Lincoln's 6 Gettysburg Address. 7 So I have to go through a few housekeeping 8 details. Anyone that goes outside the building -- 9 and I have to read this, because it's specific 10 language. Anyone that goes outside the building 11 without an FTC badge will be required to go through 12 the magnetometer and x-ray machine prior to reentry 13 into the conference center. 14 In the event of a fire or evacuation of the 15 building, please leave the building in an orderly 16 fashion. Once outside the building, you need to 17 orient yourself to New Jersey Avenue, which is this 18 street right here. Across from the FTC is the 19 Georgetown Law Center. Look to the front sidewalk, 20 that is our rallying point. Everyone will rally by 21 floors and you need to check in with me or another 22 one of the workshop organizers, who I will now ask 23 to stand up so that you can recognize them. 24 Hopefully they are in the room. Okay. And so you 25 need to check-in with us. 4 1 In the event that it is safer to remain 2 inside, you will be told where to go inside the 3 building. If you spot suspicious activity, please 4 alert security. 5 This event will be photographed, 6 videotaped, webcast, and otherwise recorded. By 7 participating in this event, you are agreeing that 8 your image and anything you say or submit may be 9 posted indefinitely at FTC.gov or on one of the 10 Commission's publically available social media 11 sites. 12 We would ask people to take seats, rather 13 than standing, as it is against fire code, and that 14 people not place their belongings on the seats next 15 to them. Please also turn your cell to vibrate or 16 off while in the room. 17 Question cards are available in the 18 hallway, immediately outside of the conference room, 19 on the table with FTC materials. If you have a 20 question, fill out your card, raise your hand, and 21 someone will come get it. 22 For those of you participating by webcast, 23 you can tweet your question to #FTCIOT, email it to 24 [email protected], or post it to the FTC's Facebook page in 25 the workshop status thread. Please understand that 5 1 we may not be able to get to all of the questions. 2 So without further ado, I would like to 3 introduce Edith Ramirez, Chairwoman of the FTC. 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 6 1 OPENING REMARKS 2 MS. RAMIREZ: Thank you, Karen. I want to 3 say good morning to everyone and welcome you all to 4 the Federal Trade Commission's Internet of Things 5 workshop. 6 Before I start, I just want to extend my 7 appreciation and gratitude to the FTC staff who 8 organized this workshop and also to all of the 9 speakers who are going to be joining us today in 10 lending their expertise and experience in this very 11 interesting topic. So thank you again and thank all 12 of you for being here early this morning. 13 The Internet of Things has already entered 14 the daily lives of many consumers. We can now rely 15 on home security systems that show us who is at the 16 front door on a screen on our tablets, even if we 17 are across the country. We wear wireless medical 18 and fitness devices that share our blood glucose 19 readings with our doctors or tweet our race time to 20 our followers. Sensors in our plants can send us a 21 message to remind us that they need watering. 22 But we are on the cusp of even more 23 change. Today's workshop examines the next 24 technological leap when many, if not most, everyday 25 physical objects will be able to communicate with 7 1 other objects, as well as with ourselves. Almost 2 anything to which a sensor can be attached can 3 become a node in a ubiquitous network, continuously 4 transmitting data in real time. It's estimated 5 there are already 3.5 billion such sensors and some 6 experts expect the number to increase to trillions 7 within the next decade. 8 Now, it is still early when it comes to 9 the Internet of Things, but it is clear that change 10 is afoot. Five years ago, for the first time, more 11 things than people connected to the internet. By 12 2020, an estimated 90 percent of consumer cars will 13 have some sort of vehicle platform, up from 10 14 percent today. And it is estimated that, by 2015, 15 there will be 25 billion things hooked up to the 16 internet. By 2020, we are told the number will rise 17 to 50 billion. 18 The Internet of Things is poised to 19 transform manufacturing, business, and agriculture. 20 Much of this can occur without collecting data about 21 individuals, but in the consumer market smart 22 devices will track our health, help us remotely 23 monitor an aging family member, reduce our monthly 24 utility bills, and alert us that we are out of milk. 25 The benefits to consumers will, no doubt, 8 1 be great but these benefits come with undeniable 2 privacy risks. The very technology that allows you 3 to stream your favorite movie or send for help when 4 your car breaks down can also collect, transmit, and 5 compile information about your actions. 6 As I see it, the expansion of the Internet 7 of Things presents three main challenges to consumer 8 privacy. First, it facilitates the collection of 9 vastly greater amounts of consumer data. Second, it 10 opens that data to uses that are unexpected by 11 consumers, and third it puts the security of that 12 data at greater risk. I'd like to offer my 13 perspective on each of these challenges and I know 14 that others are going to be addressing them 15 throughout the course of the day as well. 16 Let me turn to the ubiquitous collection 17 of consumer data that the Internet of Things will enable. 18 We are told to expect that, in the not too distant 19 future, many if not most aspects of our everyday 20 lives will be digitally observed and stored. The 21 enormous data trove that will result will contain a 22 wealth of revealing bits of information that, when 23 patched together, may present a deeply personal and 24 startlingly complete picture of each of us --our 25 health, our religious preferences, our financial 9 1 circumstances, and our family and friends. Our 2 personal profiles will be parsed, augmented, and 3 shared as they travel through an interconnected 4 mosaic of commerce. 5 As one tech writer has explained, in very 6 technical terms, "The Internet of Things will mean 7 really, really big data." Well, with really big 8 data comes really big responsibility. It is up to 9 the companies that take part in this ecosystem to 10 embrace their role as stewards of the consumer data 11 they collect and use. That means adherence to the 12 three core best practices espoused by the FTC: 13 privacy by design, simplified consumer choice, and 14 transparency. 15 First, privacy by design. Companies 16 developing new products should build in consumer 17 privacy protections from the very outset. Privacy 18 should be integral to the innovation process with 19 privacy hard-coded in. Companies should also 20 consider how to shift the burden of privacy 21 protection off of the shoulders of consumers. 22 For example, are there defaults or other 23 design features that can help prevent consumers from 24 sharing personal data in an unwanted manner? 25 Privacy tools and settings should be as easy to use 10 1 as the underlying product or service. 2 The second central principle is simplified 3 consumer choice. Taking context into account, the 4 companies that take part in the Internet of Things 5 should give consumers control over their data.
Recommended publications
  • Internet of Things Meets Brain-Computer Interface: a Unified Deep Learning Framework for Enabling Human-Thing Cognitive Interactivity
    JOURNAL OF LATEX CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 Internet of Things Meets Brain-Computer Interface: A Unified Deep Learning Framework for Enabling Human-Thing Cognitive Interactivity Xiang Zhang, Student Member, IEEE, Lina Yao, Member, IEEE, Shuai Zhang, Student Member, IEEE, Salil Kanhere, Member, IEEE, Michael Sheng, Member, IEEE, and Yunhao Liu, Fellow, IEEE Abstract—A Brain-Computer Interface (BCI) acquires brain signals, analyzes and translates them into commands that are relayed to actuation devices for carrying out desired actions. With the widespread connectivity of everyday devices realized by the advent of the Internet of Things (IoT), BCI can empower individuals to directly control objects such as smart home appliances or assistive robots, directly via their thoughts. However, realization of this vision is faced with a number of challenges, most importantly being the issue of accurately interpreting the intent of the individual from the raw brain signals that are often of low fidelity and subject to noise. Moreover, pre-processing brain signals and the subsequent feature engineering are both time-consuming and highly reliant on human domain expertise. To address the aforementioned issues, in this paper, we propose a unified deep learning based framework that enables effective human-thing cognitive interactivity in order to bridge individuals and IoT objects. We design a reinforcement learning based Selective Attention Mechanism (SAM) to discover the distinctive features from the input brain signals. In addition, we propose a modified Long Short-Term Memory (LSTM) to distinguish the inter-dimensional information forwarded from the SAM. To evaluate the efficiency of the proposed framework, we conduct extensive real-world experiments and demonstrate that our model outperforms a number of competitive state-of-the-art baselines.
    [Show full text]
  • FULLTEXT01.Pdf
    Designing transparent display experience through the use of kinetic interaction A Master’s Thesis by Interaction Design Master’s Programme Rafael Rybczyński School of Arts and Communication (K3) Malmö University, Sweden August 2017 MSwedenugust 2017 Designing transparent display experience through the use of kinetic interaction Interaction Design Master’s Programme School of Arts and Communication (K3) Malmö University, Sweden August 2017 Author: Rafael Rybczyński Supervisor: Susan Kozel Examiner: Clint Heyer Thesis Project I 15 credits 2017 Acknowledgements Over the lengths of this thesis project I have received support and encouragement from a many people. First of all, I would like to thank my supervisor Susan Kozel for advising me to trust my own instinct. Moreover I would like humbly to thank all the participants without whom this project would not have been possible. Also humbly I thank Alvar, Sanna, and Susanne for shelter and feedback. For proofreading my thanks goes to Jan Felix Rybczyński and Sanna Minkkinen. Finally, my deepest gratitude is reserved to my father Dr. med. Jerzy Antoni Rybczyński. Rest in peace. I would have wished for you reading this paper. Author’s notes Often during the process of doing this study I was asked why transparent displays. What’s the point? Probably I would say this goes way back to my childhood when enjoying my father reading novel stories to us as good night stories. A good example of great stories was Scheerbart’s utopian architectural vision The Gray Cloth who told about the great Swiss architect who traveled by an airship. Wherever he went, he designed buildings made from brightly colored glass, including the roof.
    [Show full text]
  • The Zeitgeist Movement Defined
    THE ZEITGEIST MOVEMENT DEFINED REALIZING A NEW TRAIN OF THOUGHT ”The tremendous and still accelerating development of science and technology has not been accompanied by an equal development in social, economic, and political patterns...We are now...only beginning to explore the potentialities which it offers for developments in our culture outside technology, particularly in the social, political and economic fields. It is safe to predict that...such social inventions as modern-type Capitalism, Fascism, and Communism will be regarded as primitive experiments directed toward the adjustment of modern society to modern technology” - Dr. Ralph Linton www.thezeitgeistmovement.com The Zeitgeist Movement Defined Realizing a New Train of Thought 1st Edition, January, 2014 Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) The content in this text may be reproduced only for non-commercial purposes and may not be resold in any form. Any other interests require direct approval by TZM Global. Contact: [email protected] This is a 100% non-profit text. Any price paid is only for the physical publishing. Any exploitation of this work for profit will not be tolerated. Acknowledgments: The material authored here is the product of many forms of contribution, specifically the research of The Zeitgeist Movement's expanding lecture team. An enormous thanks extends to all who have contributed news, sources, tips and other forms of research. If you would like to help in translating this text, please contact TZM's linguistics team: [email protected] ISBN-13: 978-1495303197 ISBN-10: 1495303195 Contents Preface ................................................................................................... 1 Part I: Introduction Essay 1: Overview ..................................................................................
    [Show full text]
  • The Internet of Things (Iot): an Overview
    Updated February 12, 2020 The Internet of Things (IoT): An Overview The Internet of Things (IoT) is a system of interrelated incorporation of IIoT and analytics is viewed by experts as devices connected to a network and/or to one another, the Fourth Industrial Revolution, or 4IR. exchanging data without necessarily requiring human-to- machine interaction. In other words, IoT is a collection of Internet of Medical Things (IoMT): The healthcare field electronic devices that can share information among has begun incorporating IoT, creating the Internet of themselves. Examples include smart factories, smart home Medical Things (IoMT). These devices, such as heart devices, medical monitoring devices, wearable fitness monitors and pace makers, collect and send patient health trackers, smart city infrastructures, and vehicular statistics over various networks to healthcare providers for telematics. Potential issues for Congress include regulation, monitoring, analysis, and remote configuration. At a digital privacy, and data security as discussed below. personal health level, wearable IoT devices, such as fitness trackers and smart watches, can track a user’s physical IoT Characteristics activities, basic vital data, and sleeping patterns. According IoT devices are often called “smart” devices because they to a 2019 survey by Pew Research, about one-in-five have sensors and can conduct complex data analytics. IoT Americans uses a smart watch or fitness tracker. devices collect data using sensors and offer services to the user based on the analyses of that data and according to Smart Cities: IoT devices and systems in the utilities, user-defined parameters. For example, a smart refrigerator transportation, and infrastructure sectors may be grouped uses sensors (e.g., cameras) to inventory stored items and under the category of “smart city.” Utilities can use IoT to can alert the user when items run low based on image create “smart” grids and meters for electricity, water, and recognition analyses.
    [Show full text]
  • Fog Computing: a Platform for Internet of Things and Analytics
    Fog Computing: A Platform for Internet of Things and Analytics Flavio Bonomi, Rodolfo Milito, Preethi Natarajan and Jiang Zhu Abstract Internet of Things (IoT) brings more than an explosive proliferation of endpoints. It is disruptive in several ways. In this chapter we examine those disrup- tions, and propose a hierarchical distributed architecture that extends from the edge of the network to the core nicknamed Fog Computing. In particular, we pay attention to a new dimension that IoT adds to Big Data and Analytics: a massively distributed number of sources at the edge. 1 Introduction The “pay-as-you-go” Cloud Computing model is an efficient alternative to owning and managing private data centers (DCs) for customers facing Web applications and batch processing. Several factors contribute to the economy of scale of mega DCs: higher predictability of massive aggregation, which allows higher utilization with- out degrading performance; convenient location that takes advantage of inexpensive power; and lower OPEX achieved through the deployment of homogeneous compute, storage, and networking components. Cloud computing frees the enterprise and the end user from the specification of many details. This bliss becomes a problem for latency-sensitive applications, which require nodes in the vicinity to meet their delay requirements. An emerging wave of Internet deployments, most notably the Internet of Things (IoTs), requires mobility support and geo-distribution in addition to location awareness and low latency. We argue that a new platform is needed to meet these requirements; a platform we call Fog Computing [1]. We also claim that rather than cannibalizing Cloud Computing, F. Bonomi R.
    [Show full text]
  • The Internet of Things: Impact on Public Safety Communications
    Cybersecurity and Infrastructure Security Agency The Internet of Things March 2019 The Internet of Things: Impact on Public Safety Communications The Internet of Things (IoT) is the network of physical devices and connectivity that enables objects to connect to one another, to the Internet, and exchange data amongst themselves.1, 2 IoT allows connected devices to be sensed or controlled remotely across network infrastructures, creating opportunities for more direct, cross-platform integration and improved efficiencies for the transfer of data between devices. IoT presents undeniable implications for public safety IoT goes beyond simply connecting communications. In turn, comprehensively addressing the objects to the Internet; it allows ever-growing IoT environment presents a unique challenge to physical objects to intelligently self- service providers, equipment manufacturers, and consumers. identify and communicate with other Harnessing network architecture changes and equipping devices, creating a new model of everyday objects to be IoT-enabled will allow public safety information sharing with a variety of stakeholders to maximize existing infrastructure investments potential applications. and provide near-real time decision support experiences that can change how they operate. IoT Benefits IoT-enabled devices can provide numerous benefits to public safety, as shown in Table 1. For example, a traffic accident response team could use the data collected from a variety of Internet-connected devices ― such as the involved vehicles (e.g.,
    [Show full text]
  • Home Automation System Using Google Assistant
    © 2021 JETIR June 2021, Volume 8, Issue 6 www.jetir.org (ISSN-2349-5162) HOME AUTOMATION SYSTEM USING GOOGLE ASSISTANT MUDASIR M, NEHA V, NIHAAL THATHIR K, PAVAN YADAV M, POLLARPU SREERAMULU, SMITHA PATIL B.Tech. Student, Department of Computer Science and Engineering, Presidency University, Bangalore, India B.Tech. Student, Department of Computer Science and Engineering, Presidency University, Bangalore, India B.Tech. Student, Department of Computer Science and Engineering, Presidency University, Bangalore, India B.Tech. Student, Department of Computer Science and Engineering, Presidency University, Bangalore, India B.Tech. Student, Department of Computer Science and Engineering, Presidency University, Bangalore, India Assistant Professor, Department of Computer Science and Engineering, Presidency University, Bangalore, India Abstract: Nowadays Technology keeps on upgrading. The idea behind Google assistant-controlled Home automation is to control home devices with voice. On the market there are many devices available to do that, but making our own is awesome. In this project, the Google assistant requires voice commands. Adafruit account which is a cloud based free IoT web server used to create virtual switches, is linking to IFTTT website abbreviated as “If This Than That” which is used to create if else conditional statements. The voice commands for Google assistant have been added through IFTTT website. In this home automation, as the user gives commands to the Google assistant, Home appliances like Bulb, Fan and Motor etc., can be controlled accordingly. The commands given through the Google assistant are decoded and then sent to the microcontroller, the microcontroller in turn control the relays connected to it. The device connected to the respective relay can be turned ON or OFF as per the users request to the Google Assistant.
    [Show full text]
  • Openfog Reference Architecture for Fog Computing
    OpenFog Reference Architecture for Fog Computing Produced by the OpenFog Consortium Architecture Working Group www.OpenFogConsortium.org February 2017 1 OPFRA001.020817 © OpenFog Consortium. All rights reserved. Use of this Document Copyright © 2017 OpenFog Consortium. All rights reserved. Published in the USA. Published February 2017. This is an OpenFog Consortium document and is to be used in accordance with the terms and conditions set forth below. The information contained in this document is subject to change without notice. The information in this publication was developed under the OpenFog Consortium Intellectual Property Rights policy and is provided as is. OpenFog Consortium makes no representations or warranties of any kind with respect to the information in this publication, and specifically disclaims implied warranties of fitness for a particular purpose. This document contains content that is protected by copyright. Copying or distributing the content from this document without permission is prohibited. OpenFog Consortium and the OpenFog Consortium logo are registered trademarks of OpenFog Consortium in the United States and other countries. All other trademarks used herein are the property of their respective owners. Acknowledgements The OpenFog Reference Architecture is the product of the OpenFog Architecture Workgroup, co-chaired by Charles Byers (Cisco) and Robert Swanson (Intel). It represents the collaborative work of the global membership of the OpenFog Consortium. We wish to thank these organizations for contributing
    [Show full text]
  • Swarm Robotics Applications Using Argos and Mavproxy |
    WHITE PAPER Autonomous Swarms in Active Services Abstract Robotics has evolved across multiple industry segments, from manufacturing to advanced technology, surveillance, and disaster management. Typically, robotics-driven processes are characterized by a set of pre-defined requirements and operations, carried out by individual robots (bots), and performed at an accelerated pace. However, collective decision making by autonomous intelligent robots, leveraging the concepts of machine learning and artificial intelligence (AI), is becoming increasingly important for agile operations. Technological advances have helped realize swarm operations, in which autonomous bots work in a coordinated manner to effectively execute tasks. In this paper, we propose the approach, design, and implementation of a robot swarm ecosystem that enables: n Active servicing: Collective decision making and execution to solve problems n Collaboration: Automated swarm response to priority services, without external directives n Automaticity: Leveraging blockchain for real- time processing of services being advertised as well as exchange of information WHITE PAPER Autonomous Swarms: Current Trends and Challenges The robotics landscape is rapidly evolving, with bots already being deployed for enterprise operations, commercial purposes, home automation and industrial applications. Robot swarms are being leveraged across segments including retail, travel, healthcare, manufacturing and semiconductors, for a variety of use cases. These swarms are being enabled with the autonomy to operate independently once a preset task or a passive service is assigned, leading to an evolved ecosystem of autonomous nodes or swarms. However, autonomous nodes/swarms executing passive services have two specific failure points. One is central management and the other is a non-configurable preset task. De-centralized management is a viable option, but it only scales down the risk and does not eliminate the point of failure.
    [Show full text]
  • Automated Restaurant Service Management System
    Proceedings of National Level E-Conference on "Science & Technology" Organized by Shahajirao Patil Vikas Pratishthan's S. B. PATIL College of Engineering Indapur, Maharashtra, India INTERNATIONAL JOURNAL OF INNOVATIONS IN ENGINEERING RESEARCH AND TECHNOLOGY [IJIERT] ISSN No.: 2394-3696, Website: ijiert.org, Held on 15th and 16th June 2020. AUTOMATED RESTAURANT SERVICE MANAGEMENT SYSTEM Kalpesh V. Joshi, Akshay P. Dhawale, Chinmay Y. Dhekane, Kshitij S. Dhone, Mugdha P. Dhopade, Vipul P. Dhopate, Aditya S. Dhotarkar Department of Engineering, Sciences and Humanities (DESH) Abstract — Today, in the era of rapid advancement in the especially in the developed and developing nations. technology, the world attempts to automate every possible task ensuring ease to human life with improved work- II. LITERATURE REVIEW efficiency and quality [1]. This report describes in detail the It is common if customers complain for not feeling satisfied design, development and functionality of a Smart On-Floor about the services offered there are many reasons leading to Service Management System developed exclusively for the feeling of dissatisfaction including being entertain late in restaurants. The system comprises of an online wireless terms of order taken by the waiter and meals serving the issue module enabling the customers to order food from the of being late entertain could be solved with the help of the comfort of their respective tables via tablet phones; and a advancement in the technologies of the communication [1]. In robot for delivering the dishes to the customers at their accordance, this study initiates an integrated a networked respective tables. The order once placed and confirmed by system, with the focus is on its ability to solve the above the customers will be directed to the kitchen on a LCD describe limitation in order taking [2].
    [Show full text]
  • Predictive Analysis of 3D Reram-Based PUF for Securing the Internet of Things
    Predictive Analysis of 3D ReRAM-based PUF for Securing the Internet of Things Jeeson Kim Hussein Nili School of Engineering Electrical and Computer Engineering RMIT University University of California Santa Barbara Melbourne, Australia Santa Barbara, USA [email protected] [email protected] Gina C. Adam Nhan Duy Truong Electrical and Computer Engineering School of Engineering University of California Santa Barbara RMIT University Santa Barbara, USA Melbourne, Australia gina [email protected] [email protected] Dmitri B. Strukov Omid Kavehei Electrical and Computer Engineering Electrical and Information Engineering University of California Santa Barbara The University of Sydney Santa Barbara, USA Sydney, Australia [email protected] [email protected] Abstract—In recent years, an explosion of IoT devices challenge [2, 3]. Widely used traditional cryptographic and its use leads threats to the privacy and security solutions, for example, advanced encryption standard concerns of individual users and merchandises. As one (AES) and elliptic curve cryptography (ECC), can be of promising solutions, physical unclonable function (PUF) has been extensively studied. This paper investigates quality used for both the integrity and the authentication of of randomness in the first generation of 3D analog ReRAM exchanging data and messages. PUF primitives using measured and gathered data from IoT hardware anti-counterfeiting, integrated circuit fabricated ReRAM crossbars. This study is significant as (IC) trust and physical tampering are also critical the randomness quality of a PUF directly relates to its tasks [4]. In 2014, defense advanced research projects resilience against various model-building attacks, includ- ing machine learning attack.
    [Show full text]
  • Smart Dust Technology
    250, Mini-Project Report Amy Haas Smart Dust Technology Smart dust is an emerging technology with a huge potential for becoming an internationally successful commercial venture. Now is the best time to invest in smart dust – right at the point at which the scientific community is close to perfecting the technology and its applications but its potential has not yet been realized by the capitalist market. Fundamental Concept Smart dust is a theoretical concept of a tiny wireless sensor network, made up of microelectromechanical sensors (called MEMS), robots, or devices, usually referred to as motes, that have self-contained sensing, computation, communication and power1. According to the smart dust project design created by a team of UC Berkeley researchers2, within each of these motes is an integrated package of “MEMS sensors, a semiconductor laser diode and MEMS beam-steering mirror for active optical transmission, a MEMS corner-cube retroreflector for passive optical transmission, an optical receiver, signalprocessing and control circuitry, and a power source based on thick-film batteries and solar cells.” The intent is that these motes will eventually become the size of a grain of sand or a dust particle, hence the name “smart dust”, but the technology still has a long way to go to achieve its target size. In current sensor technology, the sensors are about the size of a bottle cap or small coin. As with most electronic devices or technologies, the biggest challenges in achieving actual smart dust are the power consumption issues and making the batteries small enough. Although there is a lot of work being done on solar cells to keep the motes self-sustaining, the components are just not small enough yet to actually be considered smart dust.
    [Show full text]