The implementation of the Internet of Things (IoT) continues to grow at an astonishing rate across various industries as it becomes a key factor in differentiating and providing additional value to other independent devices.
This article covers current trends in IoT technology adoption and the implementation challenges faced by embedded developers. It then provides recommendations for successful implementation to ensure that the development of IoT connected devices meets time-to-market expectations and sustains long-term growth.
IoT adoption trends
Key trends driving the adoption of the Internet of Things include:
Smartphones are ubiquitous, and their applications permeate every aspect of our lives, fueling expectations for similar connected digital experiences on other devices. For example, traditional standalone devices, such as thermostats or air compressors, are increasingly being developed as connected devices with digital user experiences.
IoT connectivity allows device manufacturers to continue managing devices after they have been sold and deployed in the field. Device manufacturers can provide remote firmware updates to maintain device security, or they can provide remote maintenance and servicing of the devices.
As computing and storage resources for IoT devices grow, they are becoming more capable of providing local, real-time responses and exhibiting increasing intelligence and autonomy. This intelligence typically relies on data analytics and machine learning performed in the cloud, which then continuously refines the local intelligence on the device.
The Internet of Things (IoT) enables equipment manufacturers to offer additional value-added services around their devices. This can also lead to business transformation, with equipment manufacturers focusing on sales outcomes rather than equipment (e.g., selling compressed gas as a service instead of selling compressors).
The Internet of Things uses curves
Initial IoT adoption priorities may vary from organization to organization. However, over time, as learning and experience with IoT grow, new use cases are identified and implemented. Overall, IoT enablement can be viewed as a journey where humble beginnings grow over time, ultimately leading to business transformation.
A typical IoT adoption journey for an enterprise might begin with some simple proof-of-concept, followed by providing users with the experience of connected devices, such as remotely turning them on/off or collecting, visualizing, and analyzing telemetry data. The ability to remotely manage and service devices can then be added.
The IoT adoption curve from proof of concept to new business models.
Furthermore, as more insights are gleaned from the collected data, equipment manufacturers can offer additional value-added services, including energy management and predictive maintenance. Ultimately, equipment manufacturers can develop new business models around their equipment, focusing on sales results rather than simply selling the equipment itself.
A key issue to note here is that this process evolves over time and builds upon the initial capabilities. As the value of the solution increases, so does its overall complexity and underlying implementation, as well as its feature set.
Challenges of IoT Applications
By definition, the implementation of the Internet of Things (IoT) encompasses multiple interoperable domains. It involves "things," typically embedded devices with varying capabilities. These consist of data collection and processing capabilities (IoT platforms), connectivity to the "Internet," and a user interface for end users, whether web-based or mobile applications.
Given this hierarchical definition, some key challenges inherent in IoT implementation include:
Security. Maintaining security at every layer throughout the entire lifecycle of an IoT implementation is a critical challenge. All interoperability domains have different security requirements. For example, embedded devices require firmware updates and security vulnerability patching, which may be discovered after deployment. IoT platforms and applications also require software package updates and need access control maintained at different levels. Cyberattacks that compromise operations and critical infrastructure are among the top five rising risks globally.
Keep up with technological advancements. Generally, there is a lot of activity at each implementation layer, with new technologies being introduced quite frequently while older components are phased out. Since IoT-enabled devices can be deployed long-term and remain active in the field, it is important to provide functional and technological updates for each layer to stay relevant.
Compliance. New regulations and compliance requirements are constantly emerging at the government, industry, or organizational levels, necessitating adjustments to IoT implementations.
Cost management. Keeping the cost of IoT implementation under control is another challenge for device manufacturers, as it can grow significantly over time as integration between different layers is achieved and they are operated as an IoT solution for an extended period.
Scalability. The implementation of the Internet of Things (IoT) needs to scale over time. Horizontally, more devices will be widely connected, and vertically, more services and systems will need to be integrated, as the journey of IoT solutions will ascend the adoption curve.
Internet of Things Implementation Methods
Starting an IoT journey can be incredibly simple. All one needs to do is use community hardware, install pre-configured open-source software/applications, add an internet connection to one of the free IoT platform accounts, and begin visualizing data through a free dashboard application. This simplicity is quite useful in one aspect as it facilitates quickly trying out simple IoT use cases, but it can also carry considerable risk as it pushes organizations toward self-produced IoT implementations.
As mentioned above, this is just the beginning of a long journey. Using a DIY approach opens the door to several potential challenges, such as security and threat management, technology updates, compliance, development and integration costs, and future scalability requirements.