IoT is a rapidly growing industry with endless potential applications in every sector, but there are unique challenges associated with adding connectivity to — well, everything. Those hurdles include ensuring dependable connectivity, robust security, and compatibility between devices, systems, and software. In this article, we’ll break down seven of the most common challenges to IoT development and deployment and how to overcome them.
To jump to what you need, click the links below:
By its nature, IoT opens up networks to the possibility of hacking. That’s because it involves connecting many objects or “things” to the internet that did not previously link to a network. For example, manufacturing companies connect IoT sensors to machinery on the factory floor, while homeowners purchase smart home devices such as thermostats, doorbell cameras, and light switches.
With innovation comes new vulnerability. Each connected thing, whether it’s a temperature sensor buried underground or a fitness watch, adds a doorway through which hackers could enter — and potentially bring down entire networks.
IoT security seeks to protect devices and networks, addressing the specific issues inherent to IoT deployments. But ensuring robust security for IoT devices is no easy task. Let's dive into a few of the challenges.
Many IoT devices require frequent updates, including updates for security features. Some require manual interaction to update software and firmware, but these days many wireless devices allow automatic over the air (OTA) updates. Even if a device is kept up-to-date, though, there can be holes in system security — especially if the device manufacturer or software designer retires a product or goes out of business and stops creating updates.
Most IoT devices do not encrypt communications if the data is transferred over a local Wi-Fi network. If the Wi-Fi network is unsecured (and many are, especially public Wi-Fi networks), this leaves the device wide open to security risks.
Typically, IoT devices are not equipped with the same security features that standard computers have. In many cases, it’s nearly impossible to detect malware or ransomware in a device unless you’re an expert at coding.
There have been quite a few high-profile IoT security breaches — in fact, that’s one of the main PR problems IoT developers have to contend with. One example is the 2015 Jeep Cherokee hack, when two hackers remotely took control of a car using vulnerabilities in the entertainment system to access its dashboard functions. The two hacker-researchers commandeered the car while a journalist was behind the wheel, initiating a series of unexpected disturbances and finally disabling the brakes, causing the driver to swerve into a ditch. The experiment demonstrated just how serious — and life-threatening — IoT security vulnerabilities can be.
To build a solid IoT security framework, you need to address every layer of the stack. Here are a few best practices to keep in mind. (For more, check out The Ultimate Guide to IoT Security.)
With Hologram’s eUICC-enabled Hyper SIM devices can automatically be updated over-the-air and benefit from our network that is purpose-built for IoT. The Dashboard offers built-in security with predictive alerts, IMEI locking, fraud protection, and more, to help mitigate potential security breaches.
IoT is a fast-developing area of technology. The wheels of bureaucracy, on the other hand, turn very slowly. Many legislators are either not aware or don’t fully understand the workings of IoT, so they are reluctant to create or enforce regulations about what businesses can or cannot do.
Beyond connectivity regulations, depending on where you deploy, there are also different laws and regulations as it relates to data usage, like GDPR. Let’s take a look at some examples.
When it comes to data collected by IoT devices, there are no clear regulations on which information is private or public. For example, an IoT toy could collect information from a child without the parents’ knowledge or consent, and share that data with the manufacturer — who presumably could then share it with others without clear boundaries.
Currently, the legal ramifications for data theft from companies is minimal, which does not really motivate them to tighten security. If 10,000 credit card numbers are stolen, little action is taken aside from a tarnish on the reputation of the company.
Both government organizations and private companies often retain information long after it is out of date and no longer relevant — and once that data is locked into a large system, it may be hard to extricate. For example, consider those who were added to TSA’s “no fly” lists by accident — once they are in that system, it’s nearly impossible to get them out.
Until governments can define privacy and security policies around IoT, software and hardware developers need to create their own framework. Here are a few key ideas:
Hologram created our secure, plug-and-play private APN solution to meet security best practices for IoT devices. It’s configured to keep devices separate from one another and help protect the data collected on connected devices.
Compatibility between devices, operating systems and software is a common debacle in the world of technology, but especially so in IoT. With a huge variety of manufacturers and providers, making devices and systems “talk” to each other can be a problem.
In healthcare IoT, when an insulin pump only communicates with a particular operating system, it inhibits functionality for patients who may have a PC running a different OS. There also could be complications around the device’s wireless standard — for example, if it uses Bluetooth, it could inadvertently connect to the wrong nearby device. As the pump ages, more compatibility issues could emerge because it will still need the same connectivity standard, which could be no longer compatible with newer computers or docking devices.
Recommended reading: Applications of IoT for Healthcare
Here are a few possible solutions if you’re having IoT device compatibility problems:
With Hologram’s secure device tunneling, users can access devices through our firewall. This allows users to update firmware, configure devices, and more.
As more and more IoT devices become connected in a geographical area, more data will flow through those devices — including higher-bandwidth data such as audio and video — placing strain on the server farms that process all that information.
Here are a few scenarios where growing device count and larger data files could create IoT bandwidth challenges:
Enhanced management and edge processing can help. If IoT devices themselves are able to prioritize information and only send what is needed at a particular time, that bandwidth regulation can help reduce the strain on servers.
Hologram can help teams select the right profile for their devices to meet desired performance requirements, like throughput and latency. As needs and the connectivity landscape changes, teams can leverage over-the-air updates to tailor coverage on eUICC-enabled SIMs.
One perpetual problem with technology products of all kinds — including IoT devices — is the tendency for end users to avoid playing an active role in device health. They don’t want to download updates and change passwords because they feel there are negative trade-offs for doing so.
For example, end users may avoid updates because they think they take up too much memory space, might damage compatibility with other non-updated devices, or would render the device unusable during the update period. But avoiding updates can have negative effects on device security and performance, leaving it open to potential hackers — and without the features included in the latest updates.
Here are a few ways to motivate end users to play an active role in device health:
Leveraging an eUICC-enabled SIM, like Hologram Hyper, makes it easy to update devices remotely. Keeping up-to-date with new releases will keep devices secure and avoid lapses in connectivity.
For companies and organizations that invest in IoT applications, managing their fleet of devices can be one of the most challenging aspects of successful implementation. Even with a robust IoT platform in place that supports device management, the organization needs at least a few team members who are well-versed in the technologies to oversee the deployment and deal with any anomalies and alerts when devices in the field are compromised or in need of service.
According to this piece in TechTarget, 30 percent of overall IoT systems development time is consumed with device management issues such as provisioning, onboarding, and updating devices and systems. That’s a lot of time and energy to expend, especially in companies with few IoT experts on the team. One complication is the wide variety of connectivity types that devices may be using — from 2G, 3G, 4G, and 5G networks to LPWAN to Wi-Fi and BLE — each requiring a slightly different management approach. Data organization and analysis is also an issue, especially when thousands or millions of devices are collecting and sending data.
Recommended reading: IoT Connectivity is Taking a Huge Leap — Here’s What Developers Need to Know
Here are a few shortcuts for simplifying device management in your IoT fleet:
Hologram’s Dashboard is designed to save team time by surfacing the most critical device information at a glance. Optimize your device spend and monitor fleet performance to minimize downtime.
Because (like cybersecurity) it’s a relatively new field, IoT suffers from a professional skills gap. Many IT professionals are experts in some aspects of IoT, but few have the breadth of understanding and visionary skills to perceive all the possibilities — and vulnerabilities — in this exciting field.
The main reason this skills gap exists is because IoT is developing so rapidly — meaning there simply hasn’t been time for many people to develop the skill set needed to work with this technology. There are also a limited number of IoT experts currently in the industry, making training new people even more difficult. In a recent survey, 38 percent of respondents said they lacked in-house expertise in IoT network management, while 27 percent said they anticipate challenges with IoT projects because of a dearth of in-house experience to deploy IoT.
If your organization is facing a shortfall of IoT talent, here are a few solutions:
Focus on training people within your organization — because there aren’t that many experts “out there,” start internally.
Things are changing so quickly in IoT that looking for a current expert might not be enough. While you need someone with hard skills about how the technology works, it’s also essential to look for hires who have the soft skills to learn quickly and continue to upskill going forward as new technology is developed.
Some companies outsource their IoT work to other companies focused in the field because they’ve already done the hard work of training and finding experts. It might cut into your bottom line, but it will also save a lot of time.
The Hologram team is full of experienced experts as it relates to IoT and connectivity. From keeping up-to-date on regulatory changes to supporting the latest IoT innovations, we’ve built Hologram to help navigate the complexities of IoT.
All cellular IoT devices need a dependable source of connectivity — and a platform for device management. Hologram’s IoT SIM card offers seamless, global coverage for IoT devices with access to LTE/4G/3G/2G technologies. With our Hyper eUICC-enabled SIMs, you’ll gain access to new connectivity partnerships without any additional carrier negotiations, integrations, or hardware swaps. And our IoT dashboard provides a collaborative workspace for managing your entire deployment, with real-time visibility into fleet health, data limits, and device usage.