SlideShare a Scribd company logo
IoT 7 Critical Musts
Clint Smith, P.E.
csmith@nextgconnect.com
Abstract
Making an IoT device or platform decision involves many issues to consider. This paper
discusses the seven (7) critical musts that need to be considered when deciding on your
IoT solution or service offering.
Next G Connect
www.nextgconnect.com 1 August 1, 2019
The internet of things (IoT) whether it is for industrial, military, commercial, enterprise or consumer devices is
anything but a simple topic. The vastness of the types of IoT devices, their operating system, capabilities, method of
communication, as well as initial and recurring cost makes selecting the proper device for the job at hand, the use
case, challenging.
The IoT decision process involves many steps or decisions however the first thing that you need to do is determine
your objective. This is more of a business decision than a technical one because the business decision should be
driving the technical decision. Specifically defining what your use case or cases are that you need to address critical
in the IoT selection process.
Selecting an IoT device or devices that meet your particular use case has numerous attributes that need to be
addressed. In addition to defining the attributes needed for an IoT device there are likely to be some tradeoffs that
will take place in the process. As with any decision the devil is always in the details and it is important to know how
to cull the potential candidate list in order to arrive at the best decision possible given what is known at the time.
For IoT decision process you can either rely on a vendor or your consultant to provide recommendations or solutions.
Keep in mind that there are numerous IoT devices and protocols which have not been commercially successful,
however many of them have seen limited roll outs resulting in stranded devices from a product enhancement.
However, I have found that it is always best to understand some of the options so the best decision can be made to
meet your needs.
Therefore, what follows are the seven critical requirements you need to consider when pursing an IoT solution. The
seven critical musts should be part of the IoT decision whether for a greenfield deployment, retrofit or enhancement.
The 7 critical must list is generic and vendor neutral on purpose. The list is also not all inclusive however it is always
easier to criticize/edit than it is to create.
IoT Decision 7 Critical Musts:
1. Objective/Purpose
2. Security (cyber/physical)
3. Data Acquisition/Functions
4. Standards and Compliance Regulations
5. Business (CapEx/OpEx/Revenue)
6. Interface /User Experience
7. Technology
Each item of the 7 Critical Musts can easily be expanded. The order is not as important as making sure they are all
addressed. However, I would keep the objective/purpose as the first step since everything else is determined from
that point onward.
1. Objective/Purpose.
Think of this as a high-level design/decision where you need to answer some questions pertaining to what
problem you are solving.
a) What is the problem you are solving and how is it being addressed now.
b) Are you offering the IoT device as a paid service or for internal consumption.
c) What do you want to control or monitor.
Next G Connect
www.nextgconnect.com 2 August 1, 2019
d) How do you want to convert the physical signal into some digital form.
e) What do you want to do with the data, monitor/report/act.
f) Will this involve edge computing and or artificial intelligence.
g) What is the plan for the data collected from all the IoT devices.
h) Is there a need for a Northbound interface to communicate with 3rd
party systems (local or cloud).
i) When do you need the device installed, ready.
j) Are there legacy systems, requirements, that you need to include.
Once you know what you want one of the follow-up decisions is do you want to design and build your own
platform, write code, be a system integrator or just be a reseller.
2. Security (cyber/physical)
Security means many things to different people even within the same organization. However, including Security
by Design (SbD) from the inception is more important than ever as the amount of IoT devices continue to grow
increasing the security threat landscape and vectors.
a) Will the IoT device be placed in a trusted or non-trusted environment.
b) Does the device need to be physically protected.
c) Does the data being sent need to be encrypted.
d) How is the data collected stored and protected.
e) How is the device authorized/authenticated.
f) Will remote access to the device be required and if so how.
g) Will IoT device use an agent or agent-less security process.
h) Will the IoT device operate in a zero-trust environment.
i) How are software patches, configuration changes and updates be performed.
j) Will the IoT device utilize open source code.
k) Compliance and regulation requirements.
l) What is the resiliency/disaster recovery program/process you will use.
m) How do you verify that the IoT device is not a counterfeit.
n) How do you verify that the IoT device is in security compliance.
o) How are you ensuring that IoT devices are not compromised for MitM attacks.
p) Does the security governance program/process need to be modified due to the IoT device.
3. Data acquisition/storage and functions
Data acquisition (DAQ) is the process of measuring real-world conditions and then converting those
measurements into a digital format at some fixed time interval. The data storage is referring to where the data
provided by the IoT device as well as any post processing reside. The functions define what the IoT device,
middleware or system is going to do with the data.
a) Will the IoT device perform any Edge Process.
b) Will data be passed upstream.
c) Who will be able to access and use the data.
d) Do you need to share or make available to data to legacy or 3rd
party platforms.
e) Where will the analytics take place, cloud, local, hybrid.
f) How long do you need the data to be available, data life expectancy.
g) Are there any data storage/archive requirements and if so what.
h) What analytics will be performed on the data collected.
Next G Connect
www.nextgconnect.com 3 August 1, 2019
i) Life- how long do you need the platform function.
4. Standards and Compliance Regulations
Within your industry are there specific compliance regulations you need to adhere related to IoT devices. Also
do you need to utilize a specific IoT device protocol or system protocol based on your business model, use case,
or regulatory reason.
a) Are there regulatory requirements for data storage.
b) Are you required to utilize only open source code.
c) Are you required to utilize only COTS devices.
d) Can you utilize proprietary/closed systems.
e) What industry standards do you need or want to follow.
5. Business (CapEx/OpEx/Revenue)
For the business what are your Capital expense (CapEx) that you need to adhere to on a per device or system
level. Are there Operating expenses (OpEx) issues you need to factor into the decision like subscription services
per device. Regarding revenue this depends on your business model and whether you are deploying the IoT
platform for internal uses or as a service. If the IoT platform is being sold as a service, then it needs to operate
at a profit and not as a loss leader since losing money in volume is never fun.
a) Will this be a hosted system?
b) Will the IoT device be purchased from an OEM/Vendor or be custom built.
c) What is the desired CapEx cost per device, wholesale and retail.
d) How do you plan on upselling services and capabilities to existing customers?
e) What is the data mining, analysis plan.
f) What is the OEM/Vendor – size, longevity, prior relationship.
g) What support is available for IoT device from the OEM/Vendor or is it just github and blogs.
h) Operating cost- what are the recurring costs for the IoT device.
i) Device ecosystem – what other vendors use or provide services/support for this.
j) IoT device/platform- is it possible to switch vendors without losing functionality.
k) What is the installation cost associated with each IoT device.
l) What is the truck roll cost and how is this minimized.
m) What features/functions are potentially needed in 1,2 & 5yrs.
6. Interface /User Experience
This area addresses how you and or the customer interact with the device and or data.
a) What is the device management plan to ensure that the IoT device is functioning properly.
b) How do you interact with the IoT device for maintenance/inventory/status/upgrades. (graphic or CLI).
c) What is your dashboard to determine the status of the IoT device’s operational condition.
d) What visualization tools will be used to help with the management of the IoT devices.
e) Do you have any pre-defined reports that can be used.
f) How will additional rules/policies be implemented.
Next G Connect
www.nextgconnect.com 4 August 1, 2019
7. Technology
The technology portion is usually where the discussion of IoT devices and platforms begins. However, it is just
one of the items that needs to be considered. The technology decision used for the IoT device and or platform
should be determined by the other IoT critical musts.
a) What physical and logical interfaces are needed.
b) Are sensors integrated into the IoT device or are they connected via wire or wireless.
c) Is the IoT device a sensor or a SOC.
d) What is the operating system (OS) for the IoT device and whether it is open or closed (proprietary).
e) What is the operating environment the IoT device will be placed within.
f) What network topology will be used, local only, LAN, PAN, WAN.
g) Will the IoT device need to perform edge computing and will it need to extend to a fog or mist topology?
h) Wireless Topology used – star, mesh, ad-hoc, hybrid.
i) What is the source of the power for the IoT device, AC, DC, POE, battery, solar, energy harvesting.
j) How will power management be handled.
k) How often does the IoT device send data.
l) What is the bandwidth (bps) required for the IoT device.
m) Is the data sent real time, low latency, or can be it sent non-real time.
n) Will the IoT device support single or multiple application support.
o) Is modularity required of the IoT device for later enhancements, i.e. mezzanine board.
p) Scalable – how does this device scale, plan for success (100 to 100k endpoints).
q) How will software updates take place, over the air (OTA), physical, IP.
r) What data will be stored on the IoT device.
s) IoT device communication protocol type (open or closed- proprietary).
I trust that you found this article useful.
Clint Smith, P.E.
Next G Connect
CTO
csmith@nextgconnect.com
Who we are:
NGC is a consulting team of highly skilled and experienced professionals. Our background is in wireless
communications for both the commercial and public safety sectors. The team has led deployment and operations
spanning decades in the wireless technology. We have designed software and hardware for both network
infrastructure and edge devices from concept to POC/FOA. Our current areas of focus include 4G/5G, IoT and
security.
The team has collectively been granted over 160 patents in the wireless communication space during their careers.
We have also written multiple books used extensively in the industry on wireless technology and published by
McGraw-Hill.
Feel free to utilize this information in any presentation or article with the simple request you reference its origin.
If you see something that should be added, changed or simply want to talk about your potential needs please contact
us at info@nextgconnect.com or call us at 1.845.987.1787.

More Related Content

What's hot

Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS )
GICTTraining
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET Journal
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
IRJET Journal
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
Intel® Software
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
University of Ontario Institute of Technology (UOIT)
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015
Hildebrand Technology
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical Systems
Bob Marcus
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
Vishnupriya T H
 
The Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your FacilityThe Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your Facility
Senseware
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
Ahmed Banafa
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Eswar Publications
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
DESMOND YUEN
 
The Convergence of Robotics, the Web, and the IoT
The Convergence of Robotics, the Web, and the IoTThe Convergence of Robotics, the Web, and the IoT
The Convergence of Robotics, the Web, and the IoT
Intel® Software
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
vishal dineshkumar soni
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
Clearnetwork
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer Forensic
Editor IJCTER
 
Research in Internet of Things' Operating Systems (IoT OS's)
Research in Internet of Things' Operating Systems (IoT OS's)Research in Internet of Things' Operating Systems (IoT OS's)
Research in Internet of Things' Operating Systems (IoT OS's)
Salahuddin ElKazak
 
DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...
IJECEIAES
 
Io t protocols overview
Io t protocols overviewIo t protocols overview
Io t protocols overview
Clint Smith
 
Develop Future Proof IoT: Composable Semantics, Security, FuSa, and QoS
Develop Future Proof IoT: Composable Semantics, Security, FuSa, and QoSDevelop Future Proof IoT: Composable Semantics, Security, FuSa, and QoS
Develop Future Proof IoT: Composable Semantics, Security, FuSa, and QoS
Intel® Software
 

What's hot (20)

Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS ) Certified Internet of Things Specialist ( CIoTS )
Certified Internet of Things Specialist ( CIoTS )
 
IRJET - A Study on Smart Way for Securing IoT Devices
IRJET -  	  A Study on Smart Way for Securing IoT DevicesIRJET -  	  A Study on Smart Way for Securing IoT Devices
IRJET - A Study on Smart Way for Securing IoT Devices
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
A survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOTA survey in privacy and security in Internet of Things IOT
A survey in privacy and security in Internet of Things IOT
 
IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015IoT: Security & Privacy at IGNITE 2015
IoT: Security & Privacy at IGNITE 2015
 
Security and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical SystemsSecurity and Privacy in IoT and Cyber-physical Systems
Security and Privacy in IoT and Cyber-physical Systems
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
The Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your FacilityThe Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your Facility
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
A Survey on Security and Privacy Issues in Edge Computing-Assisted Internet o...
 
The Convergence of Robotics, the Web, and the IoT
The Convergence of Robotics, the Web, and the IoTThe Convergence of Robotics, the Web, and the IoT
The Convergence of Robotics, the Web, and the IoT
 
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACTSECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
SECURITY ISSUES IN USING IOT ENABLED DEVICES AND THEIR IMPACT
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer Forensic
 
Research in Internet of Things' Operating Systems (IoT OS's)
Research in Internet of Things' Operating Systems (IoT OS's)Research in Internet of Things' Operating Systems (IoT OS's)
Research in Internet of Things' Operating Systems (IoT OS's)
 
DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...DEDA: An algorithm for early detection of topology attacks in the internet of...
DEDA: An algorithm for early detection of topology attacks in the internet of...
 
Io t protocols overview
Io t protocols overviewIo t protocols overview
Io t protocols overview
 
Develop Future Proof IoT: Composable Semantics, Security, FuSa, and QoS
Develop Future Proof IoT: Composable Semantics, Security, FuSa, and QoSDevelop Future Proof IoT: Composable Semantics, Security, FuSa, and QoS
Develop Future Proof IoT: Composable Semantics, Security, FuSa, and QoS
 

Similar to IoT 7 Critical Musts

The Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve ThemThe Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve Them
Cognizant
 
Top 10 Challenges in IoT App Development.pdf
Top 10 Challenges in IoT App Development.pdfTop 10 Challenges in IoT App Development.pdf
Top 10 Challenges in IoT App Development.pdf
FuGenx Technologies
 
Iot App Demt (2).pdf
Iot App Demt (2).pdfIot App Demt (2).pdf
Iot App Demt (2).pdf
Nextbrain
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
Ahmed Banafa
 
How to fail in the IoT business
How to fail in the IoT businessHow to fail in the IoT business
How to fail in the IoT business
Perry Lea
 
Embracing iot in the enterprise
Embracing iot in the enterpriseEmbracing iot in the enterprise
Embracing iot in the enterprise
Gabriella Davis
 
the world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docxthe world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docx
pelise1
 
Entreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoTEntreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoT
Scaleway
 
IOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsIOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of Things
Nagarro
 
Internet of things
Internet of thingsInternet of things
Internet of things
SUBHASHREESUDHANSUSE
 
Emerging Global Trends in Internet of Things.pptx
Emerging Global Trends in Internet of Things.pptxEmerging Global Trends in Internet of Things.pptx
Emerging Global Trends in Internet of Things.pptx
Roshni814224
 
IOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of ThingsIOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of Things
Kuldeep Singh
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
Source Code Control Limited
 
Getting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj ShahGetting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj Shah
momoahmedabad
 
Internet of Things IoT Scotland 2015
Internet of Things IoT Scotland 2015Internet of Things IoT Scotland 2015
Internet of Things IoT Scotland 2015
Ray Bugg
 
IoT protocols overview part 2- Tethered protocols
IoT protocols overview  part 2- Tethered protocolsIoT protocols overview  part 2- Tethered protocols
IoT protocols overview part 2- Tethered protocols
Clint Smith
 
IoT Analytics From Data to Decision Making - Trends & Challenges
IoT Analytics From Data to Decision Making- Trends & ChallengesIoT Analytics From Data to Decision Making- Trends & Challenges
IoT Analytics From Data to Decision Making - Trends & Challenges
Dr. Mazlan Abbas
 
Preparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of ThingsPreparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of Things
Intel IoT
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
Ahmed Banafa
 
What is an IoT Gateway and How it Works?
What is an IoT Gateway and How it Works?What is an IoT Gateway and How it Works?
What is an IoT Gateway and How it Works?
Embitel Technologies (I) PVT LTD
 

Similar to IoT 7 Critical Musts (20)

The Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve ThemThe Five Essential IoT Requirements and How to Achieve Them
The Five Essential IoT Requirements and How to Achieve Them
 
Top 10 Challenges in IoT App Development.pdf
Top 10 Challenges in IoT App Development.pdfTop 10 Challenges in IoT App Development.pdf
Top 10 Challenges in IoT App Development.pdf
 
Iot App Demt (2).pdf
Iot App Demt (2).pdfIot App Demt (2).pdf
Iot App Demt (2).pdf
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
How to fail in the IoT business
How to fail in the IoT businessHow to fail in the IoT business
How to fail in the IoT business
 
Embracing iot in the enterprise
Embracing iot in the enterpriseEmbracing iot in the enterprise
Embracing iot in the enterprise
 
the world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docxthe world of technology is changing at an unprecedented pace, and th.docx
the world of technology is changing at an unprecedented pace, and th.docx
 
Entreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoTEntreprises : découvrez les briques essentielles d’une solution IoT
Entreprises : découvrez les briques essentielles d’une solution IoT
 
IOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsIOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of Things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Emerging Global Trends in Internet of Things.pptx
Emerging Global Trends in Internet of Things.pptxEmerging Global Trends in Internet of Things.pptx
Emerging Global Trends in Internet of Things.pptx
 
IOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of ThingsIOT 101 A Primer on Internet of Things
IOT 101 A Primer on Internet of Things
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
 
Getting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj ShahGetting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj Shah
 
Internet of Things IoT Scotland 2015
Internet of Things IoT Scotland 2015Internet of Things IoT Scotland 2015
Internet of Things IoT Scotland 2015
 
IoT protocols overview part 2- Tethered protocols
IoT protocols overview  part 2- Tethered protocolsIoT protocols overview  part 2- Tethered protocols
IoT protocols overview part 2- Tethered protocols
 
IoT Analytics From Data to Decision Making - Trends & Challenges
IoT Analytics From Data to Decision Making- Trends & ChallengesIoT Analytics From Data to Decision Making- Trends & Challenges
IoT Analytics From Data to Decision Making - Trends & Challenges
 
Preparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of ThingsPreparing the Data Center for the Internet of Things
Preparing the Data Center for the Internet of Things
 
Views and myths of IoT
Views and myths of IoTViews and myths of IoT
Views and myths of IoT
 
What is an IoT Gateway and How it Works?
What is an IoT Gateway and How it Works?What is an IoT Gateway and How it Works?
What is an IoT Gateway and How it Works?
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 

IoT 7 Critical Musts

  • 1. IoT 7 Critical Musts Clint Smith, P.E. csmith@nextgconnect.com Abstract Making an IoT device or platform decision involves many issues to consider. This paper discusses the seven (7) critical musts that need to be considered when deciding on your IoT solution or service offering.
  • 2. Next G Connect www.nextgconnect.com 1 August 1, 2019 The internet of things (IoT) whether it is for industrial, military, commercial, enterprise or consumer devices is anything but a simple topic. The vastness of the types of IoT devices, their operating system, capabilities, method of communication, as well as initial and recurring cost makes selecting the proper device for the job at hand, the use case, challenging. The IoT decision process involves many steps or decisions however the first thing that you need to do is determine your objective. This is more of a business decision than a technical one because the business decision should be driving the technical decision. Specifically defining what your use case or cases are that you need to address critical in the IoT selection process. Selecting an IoT device or devices that meet your particular use case has numerous attributes that need to be addressed. In addition to defining the attributes needed for an IoT device there are likely to be some tradeoffs that will take place in the process. As with any decision the devil is always in the details and it is important to know how to cull the potential candidate list in order to arrive at the best decision possible given what is known at the time. For IoT decision process you can either rely on a vendor or your consultant to provide recommendations or solutions. Keep in mind that there are numerous IoT devices and protocols which have not been commercially successful, however many of them have seen limited roll outs resulting in stranded devices from a product enhancement. However, I have found that it is always best to understand some of the options so the best decision can be made to meet your needs. Therefore, what follows are the seven critical requirements you need to consider when pursing an IoT solution. The seven critical musts should be part of the IoT decision whether for a greenfield deployment, retrofit or enhancement. The 7 critical must list is generic and vendor neutral on purpose. The list is also not all inclusive however it is always easier to criticize/edit than it is to create. IoT Decision 7 Critical Musts: 1. Objective/Purpose 2. Security (cyber/physical) 3. Data Acquisition/Functions 4. Standards and Compliance Regulations 5. Business (CapEx/OpEx/Revenue) 6. Interface /User Experience 7. Technology Each item of the 7 Critical Musts can easily be expanded. The order is not as important as making sure they are all addressed. However, I would keep the objective/purpose as the first step since everything else is determined from that point onward. 1. Objective/Purpose. Think of this as a high-level design/decision where you need to answer some questions pertaining to what problem you are solving. a) What is the problem you are solving and how is it being addressed now. b) Are you offering the IoT device as a paid service or for internal consumption. c) What do you want to control or monitor.
  • 3. Next G Connect www.nextgconnect.com 2 August 1, 2019 d) How do you want to convert the physical signal into some digital form. e) What do you want to do with the data, monitor/report/act. f) Will this involve edge computing and or artificial intelligence. g) What is the plan for the data collected from all the IoT devices. h) Is there a need for a Northbound interface to communicate with 3rd party systems (local or cloud). i) When do you need the device installed, ready. j) Are there legacy systems, requirements, that you need to include. Once you know what you want one of the follow-up decisions is do you want to design and build your own platform, write code, be a system integrator or just be a reseller. 2. Security (cyber/physical) Security means many things to different people even within the same organization. However, including Security by Design (SbD) from the inception is more important than ever as the amount of IoT devices continue to grow increasing the security threat landscape and vectors. a) Will the IoT device be placed in a trusted or non-trusted environment. b) Does the device need to be physically protected. c) Does the data being sent need to be encrypted. d) How is the data collected stored and protected. e) How is the device authorized/authenticated. f) Will remote access to the device be required and if so how. g) Will IoT device use an agent or agent-less security process. h) Will the IoT device operate in a zero-trust environment. i) How are software patches, configuration changes and updates be performed. j) Will the IoT device utilize open source code. k) Compliance and regulation requirements. l) What is the resiliency/disaster recovery program/process you will use. m) How do you verify that the IoT device is not a counterfeit. n) How do you verify that the IoT device is in security compliance. o) How are you ensuring that IoT devices are not compromised for MitM attacks. p) Does the security governance program/process need to be modified due to the IoT device. 3. Data acquisition/storage and functions Data acquisition (DAQ) is the process of measuring real-world conditions and then converting those measurements into a digital format at some fixed time interval. The data storage is referring to where the data provided by the IoT device as well as any post processing reside. The functions define what the IoT device, middleware or system is going to do with the data. a) Will the IoT device perform any Edge Process. b) Will data be passed upstream. c) Who will be able to access and use the data. d) Do you need to share or make available to data to legacy or 3rd party platforms. e) Where will the analytics take place, cloud, local, hybrid. f) How long do you need the data to be available, data life expectancy. g) Are there any data storage/archive requirements and if so what. h) What analytics will be performed on the data collected.
  • 4. Next G Connect www.nextgconnect.com 3 August 1, 2019 i) Life- how long do you need the platform function. 4. Standards and Compliance Regulations Within your industry are there specific compliance regulations you need to adhere related to IoT devices. Also do you need to utilize a specific IoT device protocol or system protocol based on your business model, use case, or regulatory reason. a) Are there regulatory requirements for data storage. b) Are you required to utilize only open source code. c) Are you required to utilize only COTS devices. d) Can you utilize proprietary/closed systems. e) What industry standards do you need or want to follow. 5. Business (CapEx/OpEx/Revenue) For the business what are your Capital expense (CapEx) that you need to adhere to on a per device or system level. Are there Operating expenses (OpEx) issues you need to factor into the decision like subscription services per device. Regarding revenue this depends on your business model and whether you are deploying the IoT platform for internal uses or as a service. If the IoT platform is being sold as a service, then it needs to operate at a profit and not as a loss leader since losing money in volume is never fun. a) Will this be a hosted system? b) Will the IoT device be purchased from an OEM/Vendor or be custom built. c) What is the desired CapEx cost per device, wholesale and retail. d) How do you plan on upselling services and capabilities to existing customers? e) What is the data mining, analysis plan. f) What is the OEM/Vendor – size, longevity, prior relationship. g) What support is available for IoT device from the OEM/Vendor or is it just github and blogs. h) Operating cost- what are the recurring costs for the IoT device. i) Device ecosystem – what other vendors use or provide services/support for this. j) IoT device/platform- is it possible to switch vendors without losing functionality. k) What is the installation cost associated with each IoT device. l) What is the truck roll cost and how is this minimized. m) What features/functions are potentially needed in 1,2 & 5yrs. 6. Interface /User Experience This area addresses how you and or the customer interact with the device and or data. a) What is the device management plan to ensure that the IoT device is functioning properly. b) How do you interact with the IoT device for maintenance/inventory/status/upgrades. (graphic or CLI). c) What is your dashboard to determine the status of the IoT device’s operational condition. d) What visualization tools will be used to help with the management of the IoT devices. e) Do you have any pre-defined reports that can be used. f) How will additional rules/policies be implemented.
  • 5. Next G Connect www.nextgconnect.com 4 August 1, 2019 7. Technology The technology portion is usually where the discussion of IoT devices and platforms begins. However, it is just one of the items that needs to be considered. The technology decision used for the IoT device and or platform should be determined by the other IoT critical musts. a) What physical and logical interfaces are needed. b) Are sensors integrated into the IoT device or are they connected via wire or wireless. c) Is the IoT device a sensor or a SOC. d) What is the operating system (OS) for the IoT device and whether it is open or closed (proprietary). e) What is the operating environment the IoT device will be placed within. f) What network topology will be used, local only, LAN, PAN, WAN. g) Will the IoT device need to perform edge computing and will it need to extend to a fog or mist topology? h) Wireless Topology used – star, mesh, ad-hoc, hybrid. i) What is the source of the power for the IoT device, AC, DC, POE, battery, solar, energy harvesting. j) How will power management be handled. k) How often does the IoT device send data. l) What is the bandwidth (bps) required for the IoT device. m) Is the data sent real time, low latency, or can be it sent non-real time. n) Will the IoT device support single or multiple application support. o) Is modularity required of the IoT device for later enhancements, i.e. mezzanine board. p) Scalable – how does this device scale, plan for success (100 to 100k endpoints). q) How will software updates take place, over the air (OTA), physical, IP. r) What data will be stored on the IoT device. s) IoT device communication protocol type (open or closed- proprietary). I trust that you found this article useful. Clint Smith, P.E. Next G Connect CTO csmith@nextgconnect.com Who we are: NGC is a consulting team of highly skilled and experienced professionals. Our background is in wireless communications for both the commercial and public safety sectors. The team has led deployment and operations spanning decades in the wireless technology. We have designed software and hardware for both network infrastructure and edge devices from concept to POC/FOA. Our current areas of focus include 4G/5G, IoT and security. The team has collectively been granted over 160 patents in the wireless communication space during their careers. We have also written multiple books used extensively in the industry on wireless technology and published by McGraw-Hill. Feel free to utilize this information in any presentation or article with the simple request you reference its origin. If you see something that should be added, changed or simply want to talk about your potential needs please contact us at info@nextgconnect.com or call us at 1.845.987.1787.