This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| en:iot-reloaded:iot_system_design_challenges [2024/11/26 19:22] – gkuaban | en:iot-reloaded:iot_system_design_challenges [2025/05/13 10:33] (current) – [IoT System Design Challenges] pczekalski | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== IoT System Design Challenges ====== | ====== IoT System Design Challenges ====== | ||
| - | The Internet of Things | + | The Internet of Things |
| + | |||
| + | <figure iotsdc1> | ||
| + | {{ : | ||
| + | < | ||
| + | </ | ||
| ===== Device Hardware Limitations ===== | ===== Device Hardware Limitations ===== | ||
| Line 9: | Line 15: | ||
| **Design Constraints and Strategies** | **Design Constraints and Strategies** | ||
| - | **1. Minimizing | + | **1. Minimising |
| - | IoT device design | + | IoT device design |
| - | **Low-power computing devices: | + | * **Low-power computing devices: |
| - | **Low-power communication protocols: | + | |
| - | **Energy-efficient security mechanisms: | + | |
| **2. Energy Management: | **2. Energy Management: | ||
| Mechanisms such as sleep modes or duty cycling are integrated to deactivate idle components, thereby conserving energy. However, this often compromises quality of service (QoS). Striking a balance between energy savings and performance remains a design challenge. | Mechanisms such as sleep modes or duty cycling are integrated to deactivate idle components, thereby conserving energy. However, this often compromises quality of service (QoS). Striking a balance between energy savings and performance remains a design challenge. | ||
| - | **3 Energy Harvesting: | + | **3. Energy Harvesting: |
| Incorporating energy harvesting systems (e.g., solar, thermal, or kinetic energy) can supplement energy needs, reducing reliance on batteries. Yet, these systems face limitations, | Incorporating energy harvesting systems (e.g., solar, thermal, or kinetic energy) can supplement energy needs, reducing reliance on batteries. Yet, these systems face limitations, | ||
| Line 41: | Line 47: | ||
| * Adoption of advanced networking technologies such as 5G and edge computing to enhance speed and reduce latency. | * Adoption of advanced networking technologies such as 5G and edge computing to enhance speed and reduce latency. | ||
| * Employing hybrid connectivity solutions that combine wireless and wired networks for reliability. | * Employing hybrid connectivity solutions that combine wireless and wired networks for reliability. | ||
| - | * Optimizing | + | * Optimising |
| ===== Energy and Sustainability Issues ===== | ===== Energy and Sustainability Issues ===== | ||
| - | With billions of IoT devices deployed globally, the energy demands and environmental impact | + | With billions of IoT devices deployed globally, the systems' |
| **Energy and Environmental Challenges** | **Energy and Environmental Challenges** | ||
| + | |||
| **1. Massive Energy Demand:**\\ | **1. Massive Energy Demand:**\\ | ||
| - | IoT devices, networks, and data centers | + | IoT devices, networks, and data centres |
| **2. Sustainability Concerns:** | **2. Sustainability Concerns:** | ||
| - | * The production, operation, and disposal | + | * IoT devices' |
| * Data transmission and processing in cloud systems further exacerbate energy consumption. | * Data transmission and processing in cloud systems further exacerbate energy consumption. | ||
| **Mitigation Strategies** | **Mitigation Strategies** | ||
| - | * **Energy-Efficient Design: | + | * **Energy-Efficient Design: |
| * Energy Harvesting Integration: | * Energy Harvesting Integration: | ||
| * Circular Economy Practices: Promoting reuse, recycling, and environmentally friendly manufacturing processes. | * Circular Economy Practices: Promoting reuse, recycling, and environmentally friendly manufacturing processes. | ||
| Line 67: | Line 74: | ||
| **Challenges** | **Challenges** | ||
| - | * Lack of standardized | + | * Lack of standardised |
| - | * Scalability issues arise when expanding networks, particularly | + | * Scalability issues arise when expanding networks, particularly |
| **Solutions** | **Solutions** | ||
| * Adoption of open standards such as 6LoWPAN and MQTT to ensure compatibility. | * Adoption of open standards such as 6LoWPAN and MQTT to ensure compatibility. | ||
| - | * Utilizing | + | * Utilising |
| * Implementing modular designs that simplify network expansion. | * Implementing modular designs that simplify network expansion. | ||
| - | ===== Regulation, | + | ===== Regulation, |
| The absence of universal IoT standards impedes collaboration and innovation while increasing security vulnerabilities. | The absence of universal IoT standards impedes collaboration and innovation while increasing security vulnerabilities. | ||
| Line 85: | Line 92: | ||
| **Steps Forward**\\ | **Steps Forward**\\ | ||
| - | * Collaborative efforts by organizations | + | * Collaborative efforts by organisations |
| * National and international regulations to enforce compliance, protect consumer rights, and foster interoperability. | * National and international regulations to enforce compliance, protect consumer rights, and foster interoperability. | ||
| Line 94: | Line 101: | ||
| **Security Concerns**\\ | **Security Concerns**\\ | ||
| * Inadequate security mechanisms in low-cost devices expose them to attacks like data breaches, botnets, and device hijacking. | * Inadequate security mechanisms in low-cost devices expose them to attacks like data breaches, botnets, and device hijacking. | ||
| - | * The interconnected nature of IoT systems amplifies risks, as a single compromised device can jeopardize | + | * The interconnected nature of IoT systems amplifies risks, as a single compromised device can jeopardise |
| - | * Integrating strong security mechanisms in IoT is very challenging due to hardware constraints. | + | * Integrating strong security mechanisms in IoT is challenging due to hardware constraints. |
| * Some manufacturers ship devices without adequate security mechanisms, leaving them vulnerable to cyberattacks. | * Some manufacturers ship devices without adequate security mechanisms, leaving them vulnerable to cyberattacks. | ||
| Line 118: | Line 125: | ||
| ===== Cost Issues ===== | ===== Cost Issues ===== | ||
| - | High costs of design, deployment, and maintenance can discourage IoT adoption, particularly among smaller | + | High design, deployment, and maintenance |
| **Balancing Cost and Quality**\\ | **Balancing Cost and Quality**\\ | ||
| - | * Cheaper devices often compromise | + | * Cheaper devices often compromise quality and security, |
| * Strategies to lower costs without sacrificing essential features include economies of scale, open-source solutions, and government subsidies. | * Strategies to lower costs without sacrificing essential features include economies of scale, open-source solutions, and government subsidies. | ||
| Line 129: | Line 136: | ||
| **Challenges in Adoption** | **Challenges in Adoption** | ||
| - | * Stakeholders may resist due to concerns about cost, complexity, and privacy. | + | * Stakeholders may resist due to cost, complexity, and privacy |
| * Lack of education and awareness about IoT benefits. | * Lack of education and awareness about IoT benefits. | ||
| Line 136: | Line 143: | ||
| * Highlighting ROI and long-term benefits to stakeholders. | * Highlighting ROI and long-term benefits to stakeholders. | ||
| - | The potential of IoT to revolutionize | + | The potential of IoT to revolutionise |
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||