Therefore, make sure to assess the change management eorts of the organization with a
serious perspective and utilize the agile methodologies.
Time for Projects
It is possible that there are times when the integration of IoT is inevitable. You have to understand
that the implementation of the internet of things consumes quite a lot of time. Only in a few
selected cases, the implementation is quick enough to be released within a year (9 months to be
exact). On the other hand, on average, it can take up to 24 months for an IoT project.
Such long time intervals are caused due to certain business problems, for instance without
obtaining the buy-in from the suitable stakeholders or technical problems like the lack of an
infrastructure which can back the system to scale in terms of a scenario having a commercial
deployment.
Moreover, many companies are unable to get profits in the early years and instead target the
IoT solution for improvement. Make sure that all your project stakeholders are patient enough
and create tiny success stories of yours which can please both the senior management and the
shareholders.
Necessary Skills
The cloud architecture, data analytics, back-end integration, security design, application
enablement, and embedded system design are among the skills which are needed for the solu-
tion development of end-to-end systems.
However, there are many manufacturers that simply do not possess the required experi-
ence to use LPWAN communication, AMQP and MQTT protocols, and edge analytics with the
IoT systems.
IoT experts are also concerned with the vast skill-set gap which has hovered over the data
science industry. What you can do is to assess this skill gap and use measures like cross-training
and up-skilling of employees with an emphasis on the newer technologies. Organize consulta-
tions with IoT professionals who work with various IoT applications to learn more.
Security
Often, the security aspect comes to a lot later after the development of the IoT technologies
have already begun, thus it is kind of an afterthought. Often, in the early designs, functionalities
are added in the devices at the expenses of security features. It is important to understand that
global device and data security has a strong contribution to the internet of things technology
development if the customers and businesses plan to use the IoT systems on a major scale.
For instance, the connected medical devices’ manufacturer has hired an ethical hacker. This
hacker is responsible to discover the network’s security vulnerabilities. The professional uses
standard hacking tactics like penetration, rooting, and de-obfuscation of the source code.
You should try to adhere to the best IoT security practices such as employing unique iden-
tity keys, using a secure boot process, and trying models like STRIDE model to map the attack
surface.
Interconnectivity
While looking for mobile apps, users often download and install apps without thinking much.
If these users do not know much about the internet of things, then they can have wrong ideas
about how to use it.
176 Internet of Things
Internet_of_Things_CH07_pp171-200.indd 176 9/3/2019 10:14:42 AM

Get Internet of Things now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.