Internet of Things (IoT) Definitions
This glossary explains the meaning of key words and phrases that information technology (IT) and business professionals use when discussing IoT and related software products. You can find additional definitions by visiting WhatIs.com or using the search box below.
-
A
active RFID (active radio frequency identification)
Active RFID (radio frequency identification) tags are continuously operating, battery-powered sensors that gather and transmit data to a reading device.
-
active sensor
An active sensor is a device with a transmitter that sends out a signal, light wavelength or electrons to be bounced off a target, with data gathered by the sensor upon their reflection. Active sensors contrast with passive sensors, which simply detect and respond to some type of input from the physical environment.
-
actuator
An actuator is a mechanism that turns energy into a controlled motion.
-
artificial intelligence of things (AIoT)
The artificial intelligence of things (AIoT) is the combination of artificial intelligence (AI) technologies and the internet of things (IoT) infrastructure.
-
iBeacon
iBeacon is a small-scale network device that uses Bluetooth Low Energy (BLE) and acts as a transmitter to detect and track smartphones.
-
B
blockchain dApp
A decentralized application (dApp) is a type of distributed open source software application that runs on a peer-to-peer (P2P) blockchain network rather than on a single computer.
-
Bluetooth Low Energy (Bluetooth LE)
Also marketed as Bluetooth Smart, Bluetooth LE was introduced in the Bluetooth 4.0 specification as an alternative to Bluetooth Classic. Like its predecessor, Bluetooth LE uses frequency hopping wireless technology in the 2.4 GHz unlicensed radio band to interconnect nearby devices.
-
C
car hacking
Car hacking is the manipulation of the code in a car's electronic control unit (ECU) to exploit a vulnerability and gain control of other ECU units in the vehicle.
-
Cellular Vehicle to Everything (C-V2X)
Cellular Vehicle-to-Everything (C-V2X) is a unified connectivity platform designed to offer vehicles low-latency vehicle-to-vehicle (V2V), vehicle-to-roadside infrastructure (V2I) and vehicle-to-pedestrian (V2P) communication.
-
D
device mesh
A device mesh is an ad hoc network in the internet of things (IoT). The term, which was coined by research firm Gartner, describes an ever-changing mesh network consisting of the endpoint devices that people use to access applications, information and other people.
-
drone (UAV)
A drone is an unmanned aircraft.
-
drone photography
Drone photography is the capture of still images and video by a remotely-operated or autonomous unmanned aerial vehicle (UAV), also known as an unmanned aircraft system (UAS) or, more commonly, as a drone.
-
drone services (UAV services)
Drone services, also known as unmanned aerial vehicle (UAV) services, is the emerging market for services built around flying robots that can be remote-controlled or flown autonomously using software-controlled flight plans in their embedded systems.
-
E
embedded device hacking
Embedded device hacking is the exploiting of vulnerabilities in embedded software to gain control of the device. Attackers have hacked embedded systems to spy on the devices, to take control of them or simply to disable (brick) them.
-
embedded firmware
Hardware makers use embedded firmware to control the functions of various hardware devices and systems much like a computer’s operating system controls the function of software applications.
-
embedded operating system
An embedded operating system is a specialized operating system (OS) designed to perform a specific task for a device that is not a computer.
-
embedded software
Hardware makers use embedded software to control the functions of various hardware devices and systems. Embedded software controls device functions in the same way that a computer’s operating system controls the function of software applications.
-
embedded system
An embedded system is a combination of computer hardware and software designed for a specific function.
-
embedded system security
Embedded system security is a strategic approach to protecting software running on embedded systems from attack. An embedded system is a programmable hardware component with a minimal operating system and software.
-
embedded systems programming
Embedded systems programming, also known as embedded programming, facilitates the development of consumer-facing devices that don't use conventional operating systems the way that desktop computers and mobile devices do.
-
F
What is fog computing?
Fog computing is a decentralized computing infrastructure in which data, compute, storage and applications are located somewhere between the data source and the cloud.
-
G
gateway
A gateway is a network node used in telecommunications that connects two networks with different transmission protocols together.
-
Google Glass
Google Glass is a wearable, voice- and motion-controlled Android device that resembles a pair of eyeglasses and displays information directly in the user's field of vision.
-
H
headless system
A headless system is a computer that operates without a monitor, graphical user interface (GUI) or the typical peripherals used to control it, such as a keyboard and mouse. Headless computers are often used in embedded systems and servers.
-
I
IFTTT (If This Then That)
IFTTT is an online service that automates Web-based tasks so that if one specified event occurs, another is triggered. IFTTT stands for "If This Then That" and the acronym is pronounced to rhyme with "gift."
-
industrial internet of things (IIoT)
The industrial internet of things (IIoT) is the use of smart sensors and actuators to enhance manufacturing and industrial processes.
-
injectable ID chip (biochip transponder)
An injectable ID chip, also called a biochip transponder, is an electronic device that is inserted under the skin of an animal to provide the animal with a unique identification number.
-
Internet of Everything (IoE)
The Internet of Everything (IoE) is a concept that extends the Internet of Things (IoT) emphasis on machine-to-machine (M2M) communications to describe a more complex system that also encompasses people and processes.
-
internet of medical things (IoMT) or healthcare IoT
The internet of medical things (IoMT) is the collection of medical devices and applications that connect to healthcare IT systems through online computer networks.
-
internet of things device management (IoT device management)
Internet of things device management (IoT device management) involves remotely registering, configuring, provisioning, maintaining and monitoring connected devices from a centralized platform that IT administrators can access with an internet connection from anywhere on any device.
-
Internet of Things privacy (IoT privacy)
Internet of Things privacy is the special considerations required to protect the information of individuals from exposure in the IoT environment, in which almost any physical or logical entity or object can be given a unique identifier and the ability to communicate autonomously over the Internet or similar network.
-
intranet of things
An intranet of things is a closed network that includes smart sensors and actuators.
-
IoT attack surface
The IoT attack surface is the sum total of all potential security vulnerabilities in IoT devices and associated software and infrastructure in a given network, be it local or the entire Internet.
-
IoT devices (internet of things devices)
IoT devices are the nonstandard computing devices that connect wirelessly to a network and have the ability to transmit data.
-
IoT gateway
An Internet of Things (IoT) gateway is a physical device or software program that serves as the connection point between the cloud and controllers, sensors and intelligent devices.
-
IoT middleware (Internet of Things middleware)
Internet of Things (IoT) middleware is software that serves as an interface between components of the IoT, joining elements that would not otherwise be able to connect and communicate.
-
IoT policy (Internet of Things policy)
An Internet of Things policy is a document that provides a comprehensive guide designed to help an organization deal with the complex issues surrounding the IoT.
-
IoT security (internet of things security)
IoT security is the technology segment focused on safeguarding connected devices and networks in the internet of things (IoT).
-
IPv6 address
An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint device in an Internet Protocol Version 6 (IPv6) network.
-
What is the internet of things (IoT)?
The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction.
-
L
LPWAN (low-power wide area network)
Low-power WAN (LPWAN) is a wireless wide area network technology that interconnects low-bandwidth, battery-powered devices with low bit rates over long ranges.
-
M
machine authentication
Machine authentication is the authorization of an automated human-to-machine or machine-to-machine (M2M) communication through verification of a digital certificate or digital credentials. Unlike user authentication, the process does not involve any action on the part of a human.
-
machine data
Machine data is digital information created by the activity of computers, mobile phones, embedded systems and other networked devices.
-
machine-generated data (MGD)
Machine-generated data (MGD) is information that is produced by mechanical or digital devices. The term is often used to describe the data that is generated by an organization’s industrial control systems and mechanical devices that are designed to carry out a single function.
-
machine-to-machine (M2M)
Machine-to-machine, or M2M, is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans.
-
man-in-the-middle attack (MitM)
A man-in-the-middle (MiTM) attack is a type of cyber attack in which the attacker secretly intercepts and relays messages between two parties who believe they are communicating directly with each other.
-
meet-in-the-middle attack
Meet-in-the-middle is a known plaintext attack that can greatly reduce the number of brute-force permutations required to decrypt text that has been encrypted by more than one key.
-
MEMS (micro-electromechanical systems)
A MEMS (micro-electromechanical system) is a miniature machine that has both mechanical and electronic components.
-
mesh network topology (mesh network)
A mesh network is a network in which devices -- or nodes -- are linked together, branching off other devices or nodes.
-
micro-location
Micro-location is the process of pinpointing a person's placement to within a few inches or feet using various technologies.
-
microcomputer
A microcomputer is a complete computer on a smaller scale and is generally a synonym for the more common term, personal computer or PC, a computer designed for an individual.
-
microcontroller (MCU)
A microcontroller is a compact integrated circuit designed to govern a specific operation in an embedded system.
-
mobile robot (mobile robotics)
A mobile robot is a machine controlled by software that use sensors and other technology to identify its surroundings and move around its environment.
-
MQTT (MQ Telemetry Transport)
MQTT (MQ Telemetry Transport) is a lightweight open messaging protocol that provides resource-constrained network clients with a simple way to distribute telemetry information in low-bandwidth environments.
-
N
Nest Labs
Nest Labs was a home automation specialist company that produced programmable Wi-Fi-enabled products that can be remotely controlled through a Web service or an associated smart home app.
-
P
passive sensor
Passive sensor technologies gather target data through the detection of vibrations, light, radiation, heat or other phenomena occurring in the subject’s environment. They contrast with active sensors, which include transmitters that send out a signal, a light wavelength or electrons to be bounced off the target, with data gathered by the sensor upon their reflection.
-
pervasive computing (ubiquitous computing)
Pervasive computing, also called ubiquitous computing, is the growing trend of embedding computational capability (generally in the form of microprocessors) into everyday objects to make them effectively communicate and perform useful tasks in a way that minimizes the end user's need to interact with computers as computers.
-
R
remote sensing
Remote sensing is the use of various technologies to make observations and measurements at a target that is usually at a distance or scale beyond those observable to the naked eye.
-
RF-powered computing
RF-powered computing is the use of radio frequency (RF) signals to enable the operation and communication of low-power devices, typically for machine-to-machine (M2M) networking.
-
RFID (radio frequency identification)
RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person.
-
RFID tagging
RFID tagging uses small radio frequency identification devices to track and identify objects.
-
RIOT operating system
RIOT operating system is an open source operating system specialized for IoT (internet of things) devices.
-
S
sensor data
Sensor data is the output of a device that detects and responds to some type of input from the physical environment.
-
smart bulb (smart light bulb)
A smart bulb is a networked LED light bulb that has additional features to enable automation, presence-sensing capabilities and customization.
-
smart city
A smart city is a municipality that uses information and communication technologies (ICT) to increase operational efficiency, share information with the public and improve both the quality of government services and citizen welfare.
-
smart farming
Smart farming is a management concept focused on providing the agricultural industry with the infrastructure to leverage advanced technology – including big data, the cloud and the internet of things (IoT) – for tracking, monitoring, automating and analyzing operations.
-
smart home app (home automation app)
A smart home app, sometimes referred to as a home automation app or a smart home automation app, is an application used to remotely control and manage connected non-computing devices in the home, typically from a smartphone or tablet.
-
smart home hub (home automation hub)
A smart home hub is hardware or software that connects devices on a home automation network and controls communications among them.
-
smart home kit (home automation kit)
A smart home kit, sometimes called a home automation kit or an Internet of Things (IoT) platform, is a product that includes all the hardware and software required to connect, control and manage compatible smart devices for home automation.
-
smart home or building (home automation or domotics)
A smart home is a residence that uses internet-connected devices to enable the remote monitoring and management of appliances and systems, such as lighting and heating.
-
smart manufacturing (SM)
Smart manufacturing (SM) is a technology-driven approach that utilizes Internet-connected machinery to monitor the production process. The goal of SM is to identify opportunities for automating operations and use data analytics to improve manufacturing performance.
-
smart sensor
A smart sensor is a device that takes input from the physical environment and uses built-in compute resources to perform predefined functions upon detection of specific input and then process data before passing it on.
-
smart streetlight
A smart streetlight is a public lighting fixture that incorporates technology, such as cameras, light-sensing photocells and other sensors, to introduce real-time monitoring functionalities.
-
smart warehouse
A smart warehouse is a large building in which raw materials and manufactured goods are stored that uses machines and computers to complete common warehouse operations previously performed by humans.
-
smartwatch
A smartwatch is a wearable computing device that closely resembles a wristwatch or other time-keeping device.
-
system-on-a-chip (SoC)
System-on-a-chip (SoC) technology is the packaging of all the necessary electronic circuits and parts for a "system" (such as a cell phone or digital camera) on a single integrated circuit (IC), generally known as a microchip.
-
T
thing (in the internet of things)
A thing, in the context of the internet of things (IoT), refers to any entity or physical object such as a device that forms a network and has the ability to transfer data with other devices over the network.
-
time series database (TSDB)
A time series database (TSDB) is a software system optimized to sort and organize information measured by time.
-
transponder
A transponder is a wireless communication, monitoring or control device that picks up and automatically responds to an incoming signal.
-
U
ubiquitous sensor network (USN)
A ubiquitous sensor network (USN) is one that connects all possible sensors in a given network or environment which, theoretically, could be global.
-
unique identifier (UID)
A unique identifier (UID) is a numeric or alphanumeric string that is associated with a single entity within a given system.
-
V
vehicle-to-vehicle communication (V2V communication)
Vehicle-to-vehicle communication (V2V communication) is the wireless transmission of data between motor vehicles. The goal of V2V communication is to prevent accidents by allowing vehicles to send position and speed data to one another over an ad hoc mesh network.
-
VeriChip
VeriChip is an injectable identification chip that can be inserted under the skin of a human being to provide biometric verification.
-
virtual reality sickness (VR motion sickness)
Virtual reality sickness (VR motion sickness) is the physical discomfort that occurs when an end user's brain receives conflicting signals about self-movement in a digital environment.
-
W
wearable computer
A wearable computer is any small technological device capable of storing and processing data that can be worn on the body.
-
Windows Embedded
Windows Embedded is Microsoft’s embedded operating systems product group. Examples of embedded systems include computers in cars, traffic lights, digital televisions, ATMs, airplane controls, point of sale (POS) terminals, digital cameras, GPS navigation systems, elevators, digital media receivers and smart meters, among many other possibilities.
-
WSAN (wireless sensor and actuator network)
A wireless sensor and actuator network (WSAN) is a group of sensors that gather information about their environment and actuators, such as servos or motors, that interact with them. All elements communicate wirelessly; interaction can be autonomous or human-controlled.
-
Z
Z-Wave
Z-Wave is a wireless communication protocol used primarily in smart home networks, allowing smart devices to connect and exchange control commands and data with each other.
-
Zigbee
Zigbee is a standards-based wireless technology developed to enable low-cost, low-power wireless machine-to-machine (M2M) and internet of things (IoT) networks.