Skip to main content

Back to articles

7 challenges in IoT and how to overcome them

two office workers drawing on a whiteboard

Explore some of the most popular challenges in IoT and ways you can prevent or overcome them.

Kelli Harris

September 9, 2021

IoT is a rapidly growing industry with endless potential applications in every sector, but there are unique challenges associated with adding connectivity to — well, everything. Those hurdles include ensuring dependable connectivity, robust security, and compatibility between devices, systems, and software. In this article, we’ll break down seven of the most common challenges to IoT development and deployment and how to overcome them.

To jump to what you need, click the links below:

  1. IoT security
  2. Lack of effective and informed government regulations
  3. Device compatibility
  4. Bandwidth strain
  5. End user challenges
  6. IoT device management
  7. IoT professional skills gap

1. IoT Security

By its nature, IoT opens up networks to the possibility of hacking. That’s because it involves connecting many objects or “things” to the internet that did not previously link to a network. For example, manufacturing companies connect IoT sensors to machinery on the factory floor, while homeowners purchase smart home devices such as thermostats, doorbell cameras, and light switches.

With innovation comes new vulnerability. Each connected thing, whether it’s a temperature sensor buried underground or a fitness watch, adds a doorway through which hackers could enter — and potentially bring down entire networks.

IoT security seeks to protect devices and networks, addressing the specific issues inherent to IoT deployments. But ensuring robust security for IoT devices is no easy task. Let's dive into a few of the challenges.

Managing device updates

Many IoT devices require frequent updates, including updates for security features. Some require manual interaction to update software and firmware, but these days many wireless devices allow automatic over the air (OTA) updates. Even if a device is kept up-to-date, though, there can be holes in system security — especially if the device manufacturer or software designer retires a product or goes out of business and stops creating updates.

Securing communication and encryption

Most IoT devices do not encrypt communications if the data is transferred over a local Wi-Fi network. If the Wi-Fi network is unsecured (and many are, especially public Wi-Fi networks), this leaves the device wide open to security risks.

Detecting vulnerabilities

Typically, IoT devices are not equipped with the same security features that standard computers have. In many cases, it’s nearly impossible to detect malware or ransomware in a device unless you’re an expert at coding.

Real-world example: IoT security breaches

There have been quite a few high-profile IoT security breaches — in fact, that’s one of the main PR problems IoT developers have to contend with. One example is the 2015 Jeep Cherokee hack, when two hackers remotely took control of a car using vulnerabilities in the entertainment system to access its dashboard functions. The two hacker-researchers commandeered the car while a journalist was behind the wheel, initiating a series of unexpected disturbances and finally disabling the brakes, causing the driver to swerve into a ditch. The experiment demonstrated just how serious — and life-threatening — IoT security vulnerabilities can be.

IoT security solutions

To build a solid IoT security framework, you need to address every layer of the stack. Here are a few best practices to keep in mind. (For more, check out The Ultimate Guide to IoT Security.)

  • Use wireless IoT SIM cards that automatically update the system, removing the possibility of users not updating and leaving holes in system security.
  • Wireless IoT SIM cards encrypt data by design. Using them in a variety of IoT devices will encrypt all communication.
  • The part of the device that provides connectivity can be segmented — or separated, similar to the cybersecurity practice of sandboxing — from the device function itself, allowing connective components to be analyzed individually. That way, if there’s a problem, you can isolate it before it affects the entire device.

How Hologram can help

With Hologram’s eUICC-enabled Hyper SIM devices can automatically be updated over-the-air and benefit from our network that is purpose-built for IoT. The Dashboard offers built-in security with predictive alerts, IMEI locking, fraud protection, and more, to help mitigate potential security breaches.

2. Lack of effective and informed government regulations

IoT is a fast-developing area of technology. The wheels of bureaucracy, on the other hand, turn very slowly. Many legislators are either not aware or don’t fully understand the workings of IoT, so they are reluctant to create or enforce regulations about what businesses can or cannot do.

IoT regulatory challenges

Beyond connectivity regulations, depending on where you deploy, there are also different laws and regulations as it relates to data usage, like GDPR. Let’s take a look at some examples.

No privacy policies

When it comes to data collected by IoT devices, there are no clear regulations on which information is private or public. For example, an IoT toy could collect information from a child without the parents’ knowledge or consent, and share that data with the manufacturer — who presumably could then share it with others without clear boundaries.

Lack of repercussions for leaks

Currently, the legal ramifications for data theft from companies is minimal, which does not really motivate them to tighten security. If 10,000 credit card numbers are stolen, little action is taken aside from a tarnish on the reputation of the company.

Retaining outdated data

Both government organizations and private companies often retain information long after it is out of date and no longer relevant — and once that data is locked into a large system, it may be hard to extricate. For example, consider those who were added to TSA’s “no fly” lists by accident — once they are in that system, it’s nearly impossible to get them out.

IoT regulation solutions

Until governments can define privacy and security policies around IoT, software and hardware developers need to create their own framework. Here are a few key ideas:

  • Clearly outline your privacy policy to the public to inspire confidence.
  • Highlight the security measures you take, and market your reputation of having tight security.
  • Work to connect all of your IoT devices in a sufficiently firewalled network so they are able to easily expunge outdated data from devices and records.

How Hologram can help

Hologram created our secure, plug-and-play private APN solution to meet security best practices for IoT devices. It’s configured to keep devices separate from one another and help protect the data collected on connected devices.

3. Device compatibility

Compatibility between devices, operating systems and software is a common debacle in the world of technology, but especially so in IoT. With a huge variety of manufacturers and providers, making devices and systems “talk” to each other can be a problem.

Real-world example: IoT in healthcare

In healthcare IoT, when an insulin pump only communicates with a particular operating system, it inhibits functionality for patients who may have a PC running a different OS. There also could be complications around the device’s wireless standard — for example, if it uses Bluetooth, it could inadvertently connect to the wrong nearby device. As the pump ages, more compatibility issues could emerge because it will still need the same connectivity standard, which could be no longer compatible with newer computers or docking devices.

Recommended reading: Applications of IoT for Healthcare

Device compatibility solutions

Here are a few possible solutions if you’re having IoT device compatibility problems:

  • Do your research: As you’re developing a new device or choosing which one to use in your deployment, pay attention to developing trends and sales numbers for other IoT devices. What is the most common type of network for devices in your field? Knowing that will help make sure your device can talk to others that your end users might already have.
  • Explore options like Azure IoT Hub: A current workaround for device compatibility is Microsoft’s Azure IoT Hub, a cloud-based system that serves as a kind of router for all your IoT devices, translating whatever system they are using into a common language.

How Hologram can help

With Hologram’s secure device tunneling, users can access devices through our firewall. This allows users to update firmware, configure devices, and more.

4. Bandwidth strain

As more and more IoT devices become connected in a geographical area, more data will flow through those devices — including higher-bandwidth data such as audio and video — placing strain on the server farms that process all that information.

Real-world examples

Here are a few scenarios where growing device count and larger data files could create IoT bandwidth challenges:

  • A manufacturing plant where precise, high-resolution schematics are sent to 3-D printers in large volumes could cause servers to slow down or even crash if the demands are too great.
  • Connected video cameras, which use a great deal of data transfer, could significantly overload a server farm.
  • A hospital with thousands of high-resolution radiology images and hundreds of telehealth video calls going on in a single day might put too much demand on servers.

Bandwidth solutions

Enhanced management and edge processing can help. If IoT devices themselves are able to prioritize information and only send what is needed at a particular time, that bandwidth regulation can help reduce the strain on servers.

How Hologram can help

Hologram can help teams select the right profile for their devices to meet desired performance requirements, like throughput and latency. As needs and the connectivity landscape changes, teams can leverage over-the-air updates to tailor coverage on eUICC-enabled SIMs.

5. End user challenges

One perpetual problem with technology products of all kinds — including IoT devices — is the tendency for end users to avoid playing an active role in device health. They don’t want to download updates and change passwords because they feel there are negative trade-offs for doing so.

Real-world example: hacking vulnerabilities

For example, end users may avoid updates because they think they take up too much memory space, might damage compatibility with other non-updated devices, or would render the device unusable during the update period. But avoiding updates can have negative effects on device security and performance, leaving it open to potential hackers — and without the features included in the latest updates.

End user device health solutions

Here are a few ways to motivate end users to play an active role in device health:

  • Keep updates small.
  • Make sure they are backwards compatible with older devices.
  • Make updates as uniform as possible throughout devices to avoid compatibility issues.

How Hologram can help

Leveraging an eUICC-enabled SIM, like Hologram Hyper, makes it easy to update devices remotely. Keeping up-to-date with new releases will keep devices secure and avoid lapses in connectivity.

6. IoT device management

For companies and organizations that invest in IoT applications, managing their fleet of devices can be one of the most challenging aspects of successful implementation. Even with a robust IoT platform in place that supports device management, the organization needs at least a few team members who are well-versed in the technologies to oversee the deployment and deal with any anomalies and alerts when devices in the field are compromised or in need of service.

Real-world example: provisioning, onboarding, and updating

According to this piece in TechTarget, 30 percent of overall IoT systems development time is consumed with device management issues such as provisioning, onboarding, and updating devices and systems. That’s a lot of time and energy to expend, especially in companies with few IoT experts on the team. One complication is the wide variety of connectivity types that devices may be using — from 2G, 3G, 4G, and 5G networks to LPWAN to Wi-Fi and BLE — each requiring a slightly different management approach. Data organization and analysis is also an issue, especially when thousands or millions of devices are collecting and sending data.

Recommended reading: IoT Connectivity is Taking a Huge Leap — Here’s What Developers Need to Know

Device management solutions

Here are a few shortcuts for simplifying device management in your IoT fleet:

  • If you’re a device designer, consider seeking Platform Security Architecture (PSA) certification to ensure security. (Or if you’re choosing IoT devices for deployment, look for models that have attained certification.) Created by a global coalition of seven companies, PSA certification checks device security against a framework that’s focused on IoT.
  • Data management services can help you visualize data, providing charts, dashboards, and graphs rather than number sets to allow managers to see trends and make adjustments to business practices accordingly. Consider adding an external data management or analytics service to your deployment or look for an IoT platform that includes a dashboard with data visualization.
  • If your deployment includes several device types, you’ll need a central platform or hub to view all the data and to prevent silos.

How Hologram can help

Hologram’s Dashboard is designed to save team time by surfacing the most critical device information at a glance. Optimize your device spend and monitor fleet performance to minimize downtime.

7. IoT professional skills gap

Because (like cybersecurity) it’s a relatively new field, IoT suffers from a professional skills gap. Many IT professionals are experts in some aspects of IoT, but few have the breadth of understanding and visionary skills to perceive all the possibilities — and vulnerabilities — in this exciting field.

Real-world example: lack of in-house expertise

The main reason this skills gap exists is because IoT is developing so rapidly — meaning there simply hasn’t been time for many people to develop the skill set needed to work with this technology. There are also a limited number of IoT experts currently in the industry, making training new people even more difficult. In a recent survey, 38 percent of respondents said they lacked in-house expertise in IoT network management, while 27 percent said they anticipate challenges with IoT projects because of a dearth of in-house experience to deploy IoT.

IoT skills gap solutions

If your organization is facing a shortfall of IoT talent, here are a few solutions:

Upskill current employees

Focus on training people within your organization — because there aren’t that many experts “out there,” start internally.

Reconsider hiring processes

Things are changing so quickly in IoT that looking for a current expert might not be enough. While you need someone with hard skills about how the technology works, it’s also essential to look for hires who have the soft skills to learn quickly and continue to upskill going forward as new technology is developed.

Use a managed service provider

Some companies outsource their IoT work to other companies focused in the field because they’ve already done the hard work of training and finding experts. It might cut into your bottom line, but it will also save a lot of time.

How Hologram can help

The Hologram team is full of experienced experts as it relates to IoT and connectivity. From keeping up-to-date on regulatory changes to supporting the latest IoT innovations, we’ve built Hologram to help navigate the complexities of IoT.

Hologram helps you overcome IoT challenges

All cellular IoT devices need a dependable source of connectivity — and a platform for device management. Hologram’s IoT SIM card offers seamless, global coverage for IoT devices with access to LTE/4G/3G/2G technologies. With our Hyper eUICC-enabled SIMs, you’ll gain access to new connectivity partnerships without any additional carrier negotiations, integrations, or hardware swaps. And our IoT dashboard provides a collaborative workspace for managing your entire deployment, with real-time visibility into fleet health, data limits, and device usage.

Get started with Hologram today

Talk to an IoT expert
Receive a free SIM
Customize your plan