IoT Definitions

This glossary explains the meaning of key words and phrases that information technology (IT) and business professionals use when discussing IoT and related software products. You can find additional definitions by visiting WhatIs.com or using the search box below.

  • I

    IoMT (Internet of Medical Things) or healthcare IoT

    The Internet of Medical Things (IoMT) is a network of machine-to-machine communication between medical devices and healthcare IT systems.

  • IoT attack surface

    The IoT attack surface is the sum total of all potential security vulnerabilities in IoT devices and associated software and infrastructure in a given network, be it local or the entire Internet.

  • IoT botnet (Internet of Things botnet)

    An IoT botnet (Internet of Things botnet) is a group of hacked computers, smart appliances and Internet-connected devices that have been co-opted for illicit purposes.

  • IoT devices (internet of things devices)

    IoT devices, or any of the many things in the internet of things, are nonstandard computing devices that connect wirelessly to a network and have the ability to transmit data.

  • IoT middleware (Internet of Things middleware)

    Internet of Things (IoT) middleware is software that serves as an interface between components of the IoT, joining elements that would not otherwise be able to connect and communicate.

  • IoT policy (Internet of Things policy)

    An Internet of Things policy is a document that provides a comprehensive guide designed to help an organization deal with the complex issues surrounding the IoT.

  • IoT security (internet of things security)

    IoT security is the technology area concerned with safeguarding connected devices and networks in the internet of things (IoT).

  • IPv6 address

    An IPv6 address is a 128-bit alphanumeric string that identifies an endpoint device in the Internet Protocol Version 6 (IPv6) addressing scheme. The new IP address format was created to enable the trillions of new IP addresses required to connect not only an ever-greater number of computing devices but also the rapidly expanding numbers of items with embedded computers in them.

  • item-level RFID (item-level radio frequency identification)

    Item-level RFID involves individual unit tagging, as opposed to tagging cartons or pallets of items.

  • L

    LPWAN (low-power wide area network)

    Low-power WAN (LPWAN) is a wireless wide area network technology that interconnects low-bandwidth, battery-powered devices with low bit rates over long ranges.

  • M

    machine authentication

    Machine authentication is the authorization of an automated human-to-machine or machine-to-machine (M2M) communication through verification of a digital certificate or digital credentials. Unlike user authentication, the process does not involve any action on the part of a human.

  • machine data

    Machine data is digital information created by the activity of computers, mobile phones, embedded systems and other networked devices.

  • machine-generated data (MGD)

    Machine-generated data (MGD) is information that is produced by mechanical or digital devices. The term is often used to describe the data that is generated by an organization’s industrial control systems and mechanical devices that are designed to carry out a single function.

  • machine-to-machine (M2M)

    Machine-to-machine, or M2M, is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans.

  • man-in-the-middle attack (MitM)

    A man-in-the-middle attack is one in which the attacker secretly intercepts and relays messages between two parties who think they are communicating directly with each other.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close