Cost and Security Aspects of the System for Monitoring and Managing Things Over the Internet

486-491


INTRODUCTION
Man, as well as society since its creation, has had a need for tools that make it easier for him to work.Initially, the tools were primitive and simple, and over time they became more complex.Complex tools, i.e., devices or things, need to be managed but also monitored for their operation.With the expansion of the Internet, control and monitoring is enabled from separate and remote locations, from one or more people and from other devices.With the advent of Cloud Computing, and especially the Internet of Things (IoT), the management and control of tools and systems has been simplified, especially because part of the infrastructure can be used as a service.The Internet of Things infrastructure [1] is composed of a range of detectors and services to operate assisted Cloud Computing.The devices themselves, in order to work, must be connected to a certain source of electricity as well as to Internet Access Point.As a rule, such devices are always active and consume a certain amount of electricity.Costs according to [2] are defined as a measure of economic efficiency, that is, according to [3] they represent the value-expressed effect of products or services.It should also be considered that the activities of the device connected to the Internet also pose a security risk, since sufficient time is left to intentionally redirect the data.Security according to [4] is the process of maintaining an acceptable risk, i.e., a measure to prevent against possible risks, threats, vulnerabilities, and damage to property.
Internet of Thing systems are increasingly implemented in various devices of home or business application.Also, Internet of Thing systems can be implemented on existing devices by upgrading Internet of Thing elements.This paper examines such Internet of Thing devices that offer to upgrade over existing not IoT devices.The cost and safety component shall be considered.The cost component is considered through the actual cost of electricity consumption over a period of one year.Furthermore, the questionnaire examined users' views on accepting costs and security risks to enable remote monitoring and management of existing devices over the Internet.
The research question that arises is: do users agree to the possibilities of remote control and monitoring of the device if security will be violated, and costs increased?According to the research question, hypotheses of the work are obtained: H1 Cost increases and security breaches are eligible to enable remote monitoring and management of devices.To refute or prove the hypothesis, two ancillary hypotheses have also been appointed: H1.1 To some extent, an increase in costs is acceptable to enable remote monitoring and management of devices and H1.2To some extent, security breaches are acceptable to allow for remote monitoring and operation of devices.

RELATED WORKS
There are several papers in which the consumption and security of the Internet of Thing has been analysed.The energy consumption of Internet of Thing devices is analysed in [5] where empirical data and a framework for studying and analysing the energy flow within the system are given.Furthermore, energy consumption as well as architecture and the potential way of accessing the Internet is analysed [6] where the energy optimisation model for various data traffic systems is given.The power management model related to battery utilization was given in [7].The paper provides a model for calculating battery life for certain ways of exploiting the system.The energy efficiency of Internet of Thing was analysed in [8] where the possibility of optimizing the energy costs of system components and automatic monitoring and control systems was presented.The paper [9] analyses the challenges and capabilities of low powered systems that connect to the Internet.
The types of security risks of computer systems that have access to the Internet were analysed in [4] where security risk eligibility measures were given.The security of the Internet of Thing system was analysed in [10] where an overview of Malware and possible risks and threats was given.Furthermore, the potential security risks of the Internet of Thing and the supporting components are analysed in [11] where proposals and solutions for safe and sustainable systems are given.Security, privacy, and trust were analysed in [12] where methods were proposed to increase the security of industrial Internet of Thing through various fields and application areas.

INTERNET OF THINGS
Internet of Thing is defined as "(...) a framework in which all things have a representation and a presence on the Internet.More specifically, the Internet of Things aims at offering new applications and services bridging the physical and virtual worlds, in which Machine-to-Machine communications represents the baseline communication that enables the interactions between Things and applications in the cloud."[13,14].Furthermore, [15] states "The Internet of Things can be treated as a superset of connecting devices that are uniquely identifiable by existing near field communication techniques.The words "Internet" and "Things" mean an inter-connected worldwide network based on sensory, communication, networking, and information processing technologies, which might be the new version of information and communications technology".Thus, the Internet of Things allows users to connect devices to the Internet for the purpose of monitoring and management.Each such device consumes a certain amount of energy and since it connects to the Internet also poses a certain security risk of the local computer network.

Cost Aspect
"Costs, in economics, represent the value of the assets spent and the real effort (resources) to produce a beneficial effect in the form of products or services."[3] Costs are necessary to obtain a beneficial effect.To facilitate the management and planning of costs, costs need to be divided.[2] For Internet of Things systems, cost-division by natural characteristics and in relation to changes in activity level are paramount.Thus, material costs arise: the cost of purchasing the device, the cost of accompanying services and the cost of electricity.As regards the division in relation to the change in activity level, there are: fixed procurement costs and variable costs of accompanying services as well as electricity costs.

Security Aspect
Security, as a process of maintaining an acceptable risk, is expressed in systems that by nature have the ability to remotely access from several devices of different users."Computer security is a set of measures and procedures to ensure data stored in computers, often also available over a computer network" [16].Security risks can be considered through deliberate and unintentional threats.Unintended threats are reduced by redundancy of infrastructure particularly acute in Cloud Computing systems.However, data stored in remote locations accessible over the network has a strong security risk of intentional threats."In the case of public platforms, the question arises of the security of their own data.Applications from different users are often found on the same servers, storage systems and networks."[17] In order to reduce intentional threats as well, it is necessary to use and comply with security protocols.The systems of the Internet of Things, therefore, show that security increases due to the ability to monitor and manage, but it is also disrupted due to the possibility of access through the network.

INTERNET OF THINGS DEVICE-MEASUREMENT AND RESULTS
Previous chapters mentioned that the paper examines devices that offer to upgrade the capabilities of Internet of Things to already existing devices in the household and businesses.Such devices consist of a power supply, a modem for a wireless network, a microcontroller and a relay that require constant power supply as well as a permanent connection to the Internet.To calculate the cost of such a system, Internet of Things devices which can be acquired on the market were taken.These are simple devices that are easy to implement on existing devices.The specifications are listed in Tab. 1.To give devices access to Internet, Internet Access Point must also be provided.For measurement purposes, combined devices have been taken that can be easily implemented and acquired on the market.The specifications are listed in Tab. 2. For each device, Internet of Thing device and Internet Access Point, ten measurements were made for each condition.The state of Internet of Thing Devices is related to the turned off or turn on one, two, three or four relay.Each measurement lasted 20 minutes to stabilize all components of the system.There were no devices connected to the Internet of Thing device to obtain as accurate a consumption of the upgrade itself.Internet Access Point was connected to the Internet and to the Internet of Thing device.The Internet of Thing device was monitored using the Cloud Computing service and the service was accessed via Smartphone.In each measurement, Voltage (U), Current (I), Power Factor (cos) were measured, while Apparent Power (S), Active Power (P) and annual energy consumption for Household and Business were calculated according to [20,21].For the measured values, the mean (x̄) and the standard deviation (σ) are expressed.
The results obtained for Internet of Thing devices are shown in Tab. 3 and for Internet Access Point in Tab. 4. According to the obtained measurement results and calculations, it is evident that Internet of Thing devices consume regardless of their activity, with the relay involved on the Internet of Thing device consuming significantly more electricity than the disconnected one and increasing consumption by the number of relays included.Internet Access Point consumption is proportional to the Inputs and Outputs rated specifications.The higher the rated values, the higher the measured values.
The calculations show that power factor for Internet of Thing Device as well as for Internet Access Point is about 0,5.Due to the conversion of the alternating current of higher voltage into a direct current of lower voltage, inductive reactive energy is generated.
By the General Conditions Regulations for network use and electricity supply [20], excessive barren energy is calculated for Business, but not for Household.According to the above, and according to the calculations in Tab. 3 and Tab. 4, energy consumption is not negligible for Household and certainly not for Business.
For the calculation of the annual energy consumption of the Internet of Thing system, the principle and labelling according to the Ordinance on the labelling of household appliances was taken [22].The annual power consumption of the device is indicated by the symbol AC.Accordingly, the annual electricity consumption of the Internet of Thing system (AC SioTH ) can be defined by Eq. ( 1).
where: p 0R represents the percentage of time of turn on relays of Internet of Thing device, p mR percentage of time of turn off relays of Internet of Thing Device, AC IoTON represents the annual consumption of turn on relays of Internet of Thing device, AC IoTOFFi represents the annual consumption of turn off relays of Internet of Thing device, AC AP represents the annual consumption of Internet Access Point.
Based on the Eq. ( 1), it is possible to determine the annual consumption for individual Internet from Thing with a certain number of components.

SURVEY AND RESULTS
To obtain an image of the use of the Internet of Thing and the eligibility of costs and security risks, and to refute or accept the hypothesis of the paper, a structured questionnaire collected the views of citizens.The survey questionnaire consists of three groups of questions, the first group with questions related to data about the participants' profile, another group on knowledge and use of the Internet of Thing and a third group on issues of cost and security.For the purposes of work, only the selected questions are presented.The online survey was distributed via Google Forms during 01.02.2022.to 28.2.2022.Participants, randomly selected, were guaranteed anonymity.The survey was completed by 813 participants from the territory of the Republic of Croatia.The basic data about the participants can be found in Tab. 5.The data is presented absolutely by the number of responses and relatively in percentages.Tab.6 presents the results of the participants.The presented answers are related to the advantages, disadvantages, costs and security risks of the Internet of Thing devices.The data is displayed using the mean (x̄), Median and Mod and the standard deviation (σ).The deviations from the normal distribution using Skewness and Kurtosis are also presented.As for the advantages and disadvantages of devices that can be connected to the Internet, the recognised advantages are Acceleration of business processes, Disease prevention and improving the quality of life; while for

Table 1
Specifications of IoT devices

Table 2
Specifications of Internet AccessPoint devicesFigure 1 Connection diagram These devices are connected according to the diagram shown by Fig. 1.The Internet of Things device is wired to the power grid and wirelessly to Internet Access Point.Internet of Thing device as well as Internet Access Point are connected to The Measure Device (MD) to measure Voltage (U), Currency (I), and Power Factor (cos).Measure Devices VOLTCRAFT SEM4500 [18] was used for measurement, which was verified with the measured METRELEurotest 61557 [19] device.

Table 3
Measurement and calculation data of IoT devices

Table 4
Measurement and calculation data of Internet Access Point

Table 5
Respondent profile

Table 6
The results of the respondents Which and how much of the listed costs of using the management and monitoring system via the Internet are acceptable?(1-Notacceptable, 2 -Acceptable if < 1%, 3 -Acceptable if < 2%, 4 -Acceptable if < 3%, 5 -Acceptable if < 4%, 6 -Acceptable if < 5%, 7Acceptable if -5% and more)1.The purchase price of the system in relation to the purchase price of the upgraded device.