Over a million developers have joined DZone.

Common Concerns When Implementing IoT (and How to Respond)

DZone 's Guide to

Common Concerns When Implementing IoT (and How to Respond)

Organizational leaders specialize in risk assessment and decision making. Tailor your IoT pitches as means of supplementing those decisions through connected devices.

· IoT Zone ·
Free Resource

This is the part 3 of our “How to convince your CEO to invest in IoT” blog series. Previously in part 1, we demonstrated some organizational and institutionally biasis against IoT. Then, in part 2, we explained the fundamental components of IoT and the benefits of implementation. Lastly, in this part 3, we will conclude with some common concerns (with answers) worth presenting to leadership.

Common Concerns and How to Respond

Senior leaders have vast experience and time-tested decision-making skills, which have trained them to anticipate risk. There's no need to test their abilities, but instead, it's better to support their decision-making skills with an innovative possibility. Here are some of the most common concerns about IoT and how to respond.

How To Make Sure Your Company’s IoT Projects Are Secure?

Eclipse sponsored a survey in 2016 to better understand how developers are building IoT solutions. This survey found that nearly 50% of respondents chose security as the main concern. So, what is data security anyway?

Data security consists of privacy, integrity, and availability.

Data privacy consists is the ability for an organization to manage information and determine which information is sensitive and should be restricted. Data encryption is a common way for businesses and individuals ensure privacy and consists of transforming data to disguise it from unauthorized individuals.

Data integrity represents the accuracy and consistency in making data available, reliable, and useful. For instance, data integrity is achieved when an IoT platform provider ensures constant data readings with optimal connectivity and hardware for a given environment.

All the while, data availability refers to the capacity of keeping a system operating. In IoT, for instance, availability is understood to be the capacity to access a backup data source when unexpected downtime occurs.

Companies can make sure to keep IoT data private, honest, and available by using recommended best practices and adhering to standards within each of the IoT components: devices, connectivity, and your IoT platform.

Here are some common practices recommended to any IoT developer looking to better understand security.

  • HTTPS access: is a security protocol used to protect a website from unwanted intruders. Fraudsters have been known to use web resources such as HTML or commands in order to confuse users into inadvertently providing personal information or installing malware when visiting websites
  • Token-based authentication for device APIs: The traditional server-based authentication method is not recommended for IoT devices. Such a method require the server to store the access information (like a username and password) and then grant access to the client providing those credentials. This poses a security risk in case a third party gains access to those credentials. Yes, you could just change your password, but then you would have to change the password hardcoded in thousands of devices deployed. To overcome this, API designers came up with the token-based authentication, which follows this logic:
  1. The client (a device) requests access with a username/password or an API key.
  2. The application validates credentials and provides a token to the client.
  3. The client stores that token and sends it along with every request.
  4. The server verifies token and accepts the requests.

This way, if communication is compromised, the token can be revoked on the server side and the devices would just request a new token in the next request. No need to change the firmware of thousands of remote devices.

  • Access control for customers and users: app admins can determine the levels of access of each new user within an application. Admins can even specify if they want users to edit, create, or only visualize certain information, dashboards, or widgets.
  • 2X data replication: if you lose a device's data readings for a particular reason, you should always have the peace of mind that these readings are being stored somewhere in parallel.
  • Encrypted transport: for ensuring data privacy, the data sent from devices to the cloud should be encrypted so it cannot be easily understood by unauthorized individuals. 

Is IoT Financially Attainable For Your Company?

One of the barriers to adopting new technologies are upfront costs. However, according to Goldman Sachs, numerous triggers are turning the IoT from a futuristic buzzword into a reality. The cost of sensors, processing power, and bandwidth to connect devices has dropped low enough to spur widespread deployment:

  • Sensors costs have dropped to average 60 cents from $1.30 in the past 10 years.
  • Bandwidth costs have dropped by nearly a factor of 40X in the past 10 years.
  • Processing costs have dropped by nearly 60X in the past 10 years.

So even if your IoT solution appears to have a higher cost than the value it can generate in the long term, you should still do the project; chances are that the prices will drop and you will become the first player in your industry to have the solution that your competitors saw as financially impossible.

Is IoT Just Hype?

Different thought leaders have shown special dedication and interest around the Internet of Things.

Goldman Sachs Global Investment Research proposed these five verticals for IoT adoption. The earliest adopters (which we are already seeing) are wearables, cars, and homes, with cities and industrial applications following closely behind.

Source: Goldman Sachs Global Investment Research.

Goldman Sachs released a report called “The Internet of Things: Making sense of the next mega-trend,” suggesting IoT will be the third wave of Internet, which may be the biggest. The first two waves were, of course, fixed Internet during the 1990s and mobile Internet throughout the 2000s.

The World Economic Forum features the Internet of Things as one of the technologies that will shape the 4th Industrial Revolution in the Future of Jobs Report (2016), and even dedicated a single research on the Industrial Internet of Things in collaboration with Accenture.

Tech companies such as Google, IBM, Amazon, Samsung, and Intel have developed their own Internet of Things platforms to leverage new applications.

Nations are paying attention to the Internet of Things, too. The French government is deploying a Lora network to ensure Internet connectivity throughout France. Meanwhile, Germany coined the term Industrie 4.0 in an effort to move industry to the fourth Industrial Revolution.

How Does The IoT Fit Into Your Industry?

Mckinsey released the Mapping The Value Beyond The Hype study in order to know the economic value of IoT across industries. The findings of McKinsey suggest that IoT has the power to impact directly or indirectly every single industry. Where do you fit in IoT?

iot ,iot solutions ,iot security ,industrie 4.0

Published at DZone with permission of

Opinions expressed by DZone contributors are their own.

{{ parent.title || parent.header.title}}

{{ parent.tldr }}

{{ parent.urlSource.name }}