through cooperation, additional sta, or money. Lastly, the executive oers a perspective for
the constantly changing priorities of the boardroom to keep the consistency with the corporate
strategic objectives and goals for getting the needed support.
The sponsor is also responsible to decide who should be allowed in the team and can
answer queries for the resolution of concerns. By showing a problem statement along with a
vision can prove to be eective to delineate IoT. Some of the general implementation challenges
which disrupt businesses are the following.
The Cost
The migration from one end to the other end of the maturity curve may need a hefty investment.
Businesses should avoid to over going this leap in the beginning through a single stream. The
idea behind a grand vision is convincing, however, it is too costly for the management.
To mitigate and handle the cost, many projects of IoT implementations are suggested.
These projects are reasonably aordable with fixed milestones and are known as “bite-sized”.
Begin slowly with the use of pilot technologies and go on to invest in the foundational sections
which are divided into phases. For the control of further costs, you can use the software as a
service for allowing more robust and on-premise installations.
Conversely, try to attract more improvements by assessing those IoT projects which oer
value for money while going along with the documentation of business cases.
As IoT costs are decreasingly quickly, traditional organizations can view IoT adoption
positively. That being said, organizations should keep checking their competition and prices.
Ifyou spend too much time to think then it is possible that the competition can race ahead.
Security
Uploading or moving data on the internet is one of the trickiest jobs for the IT departments.
This is because hacking has been so rampant today and has caused several breaches in recent
years. The IoT idea to not only display data online but also adding critical equipment in the mix
is extremely risky. Thus, it should come as no surprise that several IoT platforms view security
as the foremost considerations in order to make sure that they are able to thwart o any incom-
ing cyberattack. While implementing an IoT application, the security assessments can originate
from the following.
Data at Rest
When data is stored in applications and DBs via the on-premises or the cloud architecture, it
is referred to as “at rest”. Many businesses depend upon standard perimeter-based defenses
like anti-virus and firewalls to safeguard their data. Unfortunately, for hackers, such type of
data is too valuable to ignore. Hence the Cloud Security Alliance and the Broadband Internet
Technical Advisory Group suggest that encryption techniques for software and hardware
should be used in tandem to make sure that nothing goes wrong for the integrity and security
of data at rest.
Data in Use
This data refers to one which is used by a gateway or an application and it must be available to the
devices and users for access. Many experts believe that this data is the hardest to protect. While
working with in-use data, the considerations for security rely on how secure the authentication
procedures are along with the devices and users who access the data.
172 Internet of Things
Internet_of_Things_CH07_pp171-200.indd 172 9/3/2019 10:14:42 AM

Get Internet of Things now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.