Fujitsu Forum – A humble lightbulb shows the good and bad of IoT

Fujitsu CTO, Dr Joseph Reger, used a single, IP address-publishing lightbulb to extrapolate out the how the Internet of Things can be exploited, for good and ill

  • 11 years ago Posted in

 As a follow up to the oft-quoted wisdom that the applications and implications of the Internet of Things (IoT) are limited solely by human imagination, the annual question and answer session held at the Fujitsu Forum in Munich by Fujitsu’s Chief Technology Officer, Dr Joseph Reger, contained a cameo about IoT that demonstrates well what its implications could be.

Those implications play strongly to the company’s new stated position of wanting to be as human-centric as possible. As Reger showed, IoT is likely to have significant impact in creating that human centricity.  

Something of a free-thinker who is not afraid to speak his mind speculate on possibilities – many of them more plausible than many actually think possible, Reger jumped at a question about IoT. His cameo, a tale about a humble light bulb, served as an excellent object lesson in how IoT can be exploited both for good and ill.  

The light bulb in question is not a product – yet, but probably will be in the not too distant future. Its key differentiator is that it publishes an IP address, which instantly prompts the question as to why anyone would want to do that. There are good reasons, however, as Reger pointed out.

Ironicallym the most important difference about the bulb initially looks like a negative. If publishing an IP address is to be useful then the bulb has to be `on’ all the time, and therefore using electricity all the time. But to counter that users can write any number of services that the bulb itself can run.

For example, it would be a simple matter for a smartphone routine to detect a user’s location, and send the bulbs a message to turn on or off, according to need or some predetermined policy or action plan. It can even be coupled with people position sensors and light level detectors so that the use of lighting and electricity can be optimised automatically.

So, even though the bulbs would be always `on’ power consumption could be reduced by automatically removing the human tendency to leave lights on because `I’ll be back in a minute. The bulbs only consume around 20mW of power when not emitting light.

The bulbs could, of course, also detect and report on their own state, predicting the onset of obvious failure modes. That reporting could then be acted upon, in some way. It could for example, report to a user’s mobile phone of an upcoming failure. If that phone detected it was passing a hardware store, it could then contact the house gateway system to check on the status of all lightbulbs and that failing bulb could notify the user of its state. That would allow a spare bulb to be bought on the equivalent of a Just In Time manufacturing model.

The lightbulb could even play a part in health care, as Reger pointed out. For example, if it is in the home of an elderly person who, say, normally gets up at 6.30am and makes a cup of tea, the sequence of lightbulb instances can be monitored – as, of course can the kettle and other kitchen implements involved. Breaking that sequence could indicate a problem, which could then prompt a response such as getting a relative or carer to call and check up.

As this is IT there is a potential downside, of course. Reger observed that because the lightbulb has an IP address it can be identified, accessed and infiltrated by those with appropriate knowledge and tools. In practice, that means that hackers could attack all the lightbulbs in the world, inserting malicious code into these `intelligent’ devices so that they can be used to, say, launch a denial of service attack using billions of `soldiers’.

This opens up whole new areas for hackers to consider, and security services providers to start planning their defences. According to Reger, current estimates suggest that there could be around 50 billion devices on the Internet by 2020. The `good’ side of this, in Fujitsu terms, is that it offers enormous potential for making the technology human centric, where the work is done by the devices, but it is done for the people. 

It does, however, also open up a new and all-pervasive frontier in the battle to keep systems, processes and data secure from malicious miss-use. 

Talent and training partner, mthree, which supports major global tech, banking, and business...
On average, only 48% of digital initiatives meet or exceed business outcome targets, according to...
GPUaaS provides customers on-demand access to powerful accelerated resources for AI, machine...
TMF Group, a leading provider of critical administrative services for global businesses, turned to...
Strengthening its cloud credentials as part of its mission to champion the broader UK tech sector...
Nearly all UK IT managers surveyed (98%) state cloud investment is an organisational priority for...
LetsGetChecked is a global healthcare solutions company that provides the tools to manage health...
Node4 to the rescue.