Trust between Machines

Photo by Skylar Kang on Pexels.com
  • Every relationship in this world runs on trust. Be it between traders who support each other through the rough seas or the teacher-student duo who rely on each other for imparting and accepting knowledge or even in the family that trust each other’s instincts and believe in their honesty.
  • When humans benefit so much from trust on each other, it is only natural to assume that some miniscule form of that trust will also be inculcated in all the innovative products created by us. This is where the concept of trust between machines comes into question.
  • In an age where we rely heavily on technology and Artificial Intelligence, it is often noted that for remote monitoring, machine to machine communication is used (M2M).
  • M2M is essential in all those spheres of commerce and life wherever manual assistance is not possible. For this, a large number of devices are involved in networking. That means sharing of data and information across a series of devices.
  • For security purposes, each device before linking to another always asks for permission to access and share each other’s data. This is done manually or through a predesigned software to ensure that the data flow doesn’t happen between any two devices without authorization.
  • Once, either through the software or manually it is established that the user trusts the secondary device in the network, the devices connected through a common network have free reigns to share information.
  • Such trust when once established enables machines to communicate autonomously and make decisions without any kind of manual assistance.
  • The recent convergence of multiple technologies and IOT or Internet of Things (A system of interrelated computer devices or M2M) has become the foundation for the concept of ‘Smart Homes’ which include home security systems, smart lighting, thermostats etc. these can then be controlled using devices which are considered as user friendly access points such as smart phones and speakers (Artificial Intelligence based software).
  •  Trust in such technologies enables users to make their everyday life more time friendly, pragmatic and sorted in an efficient manner. Essentially that is the basis of the popularity of AI software like Google Home, Amazon’s Alexa and Echo, Apple’s- watch, home-pod, home-kit etc.
  • Such facilities are extremely beneficial during emergencies. In cases of medical emergencies, a person’s medical record may be shared over multiple interfaces to make it accessible to the doctors treating the person. Trust and better communication across all devices sharing a network makes situations like this possible.
  • Of course there is the fear that this trust maybe misused to procure date by unauthorized personnel. As such threats do exist in the real world, every software developing company, by default, builds security firewalls to protect the user date and grant exclusive date-sharing privileges to devices that the user trusts.
  • Trusted devices also provide assistance to people suffering from disabilities, injuries and even to elderly people. Cochlear implants, pacemakers, other specialized implants, voice control navigation, assistive touch etc. all help in flexibly accommodating the particular needs of such individuals.
  • Many medical devices operate on sensors which are basically AI
    to alert medical professionals during patient emergencies. These remote health monitoring and emergency notification systems are a part of the Smart Healthcare digitized system.
  • This trust between machines is also seen in automated transportation systems which includes smart traffic control, electronic toll collection, vehicular communication systems, safety and road assistance etc. All these necessities of our daily life requires the brilliant application of M2M networking.
  • Even the grand features like GPS without which we all would be lost, does require communication with several networks and satellites. This is only possible if the software controllers trust and authorize the connecting devices.
  • It also helps in integrating manufacturing devices that are equipped with sensing, identification, processing, communication and networking capabilities. It includes features like asset containment and management, process control, optimization of production line, real time energy optimization, monitoring degradation indicators in the factory and several other key benefits.
  •   Its applications in the field of agriculture know no bounds. It is beneficial in collection and interpretation of date regarding temperature, humidity, speed of wind, infestation by pests, rainfall, quality of soil etc. These automated farming techniques and technologies inadvertently improves harvest quality and quantity, reduces wastage and spoilage and demands less strenuous efforts in crop production.
  • Online shopping platforms (amazon, myntra, flipkart etc.) and monetary transactions forums like PhonePe, PayTm, Google Pay, PayPal etc. all function through a series of encrypted interfaces that are password protected and only accessed between trusted platforms with the knowledge of the user.
  • Apart from these, IOT plays an essential role in environment monitoring, military strategies and remote monitoring, energy management (smart power generation), natural disaster prediction and warning systems, cybersecurity etc.
  • In this modern, hi-tech world, where nothing is functional without technological cooperation, trusted communications between machines with manual assistance is the most reliable and time efficient pathway to follow. Without this trust, none of our daily needs will be satisfied smoothly.

Published by Allena Andress

||Bibliophile|| Biotechnologist|| Aspiring Forensic Science specialist|| Researcher|| Closet singer and dancer|| Motivational Speaker||

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: