IoT and IOE describe very similar concepts, there is actually a large difference between these terms; “Internet of Everything” and “The Internet of Things.” It’s important to get these right, as everyone is getting into the internet of things concept.
The main concept to consider, when thinking of the Internet of Everything versus Internet of Things, is that “Things” are physical objects, this means anything that has a real life presence, such as a computer, mobile phone, smart watch etc, can be regarded as a “Thing."It just takes into consideration the physical entities and the basic ones with respect to how these things can communicate ;but the Internet of Everything connects up all of the physical things , wires users etc. into one cohesive whole. It’s not just about allowing devices to talk to each other, it’s about allowing everything to talk about each other. In some ways, you can see the Internet of Things as the equivalent of a rail road line, including the tracks and the connections, whereas the Internet of Everything is all of that, and the trains, ticket machines, staff, customers, weather conditions, etc.
IOT is focused on M2M; whilst ,IOE is focused on P2P, P2M, M2M include 4 parts ( People, Machine, Things, Data). Cyber refers to use the machine for interaction.
Both IoT and IoE deals with the integration of Information Technology and Operational Technology (and hence the name of IoT). The current trends to connect the unconnected things in the cyber world.
We have heard some really good explanations of the differences between all three parts of your questions.
I am instead going to mention something you did not ask about, namely some similarities beetween all three, all of which give rise to more than a considerable amount of concern, namely issues of security and privacy.
Some of the early work on connectable systems started in the field of supervisory control and data acquisition (SCADA) systems, where live data was collected from remote locations in industries such as oil and gas refining, power plants, telecommunications, transportation, and water and waste control. In the early days, personnel would be sent to the remote location to download accumulated data as required. Later, someone hit on the bright idea of using the internet to connect these devices, since it would be far cheaper than sending personnel every day to collect the data. While this did indeed work out more efficient and cost effective, unfortunately, it also exposed everything to potential attack. Often, the hardware in use before internet connection took place had been running for decades, without the need for update. Since the software running on these systems had never been designed to be exposed to the internet, security and privacy had never been thought about, resulting in SCADA systems becoming very vulnerable to attack.
Similarly, with the development of the IoT, IoE and Cyber-physical systems, many of the small components, such as sensors, cameras and so on, are specified with lightweight levels of system resources, no doubt in the interest of cost economies, which has helped to popularise the take up of these systems. However, this results in insufficient security controls, and with many having insufficient resources to support proper levels of encryption, privacy can also be compromised.
Recently, we have seen a number of examples of the Mirai virus being used to compromise over a million IoT devices such as routers, digital video recorders (DVRs), and webcams/security cameras, enslaving vast numbers of these devices into a number of botnets, which have been used to conduct DDoS attacks. In a recent attack in September perpetrated by only 152,463 cameras and over a million IP addresses, the DDoS attack achieved attack speeds which exceeded 620Gbps. The following month, the same botnet shut down the Dyn DNS company with an attack of an unprecedented 990Gbps. It is suspected that the same source was responsible for shutting down an entire country, namely Liberia just last week.
Just because the IoT uses hardware with a small footprint, does not mean it is not a danger. Clearly there is huge danger in the volumes that attackers can harness, and this is becoming a more and more menacing problem for society as a whole. Indeed, as the IoT, IoE and Cyber-physical systems continue to evolve and expand across the globe, the problem will only get worse.
As you can see, all is not rosy in the garden. Just a little food for thought.
A slim hope indeed. Sadly, in addition to malicious actors, we must also contend with: management who refuse to take security seriously, or pass responsibility to IT, without providing adequate guidance, budget, or authority to enforce security and privacy discipline; sysadmins who fail to apply security patches; sysadmins who fail to analyse system logs properly; ill trained staff who don't understand the risks they face from failure to adhere to security policies and procedures; well trained staff who persistently behave in a promiscuous security fashion; staff who don't understand the risks from social engineering ............. but, we keep on trying.