This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| en:iot-reloaded:iot_system_design_challenges [2024/11/28 21:09] – ToDo checked: Draw the tree-diagram for headers below, one step down only pczekalski | en:iot-reloaded:iot_system_design_challenges [2025/05/13 10:33] (current) – [IoT System Design Challenges] pczekalski | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== IoT System Design Challenges ====== | ====== IoT System Design Challenges ====== | ||
| - | The Internet of Things | + | The Internet of Things transforms industries, lifestyles, and economies by enabling interconnected devices to collect, share, and act on data. However, its rapid expansion is accompanied by significant technical, economic, and societal challenges. Below, we delve deeper into these issues, exploring their nuances and potential mitigation strategies (figure {{ref> |
| <figure iotsdc1> | <figure iotsdc1> | ||
| Line 8: | Line 8: | ||
| </ | </ | ||
| - | <todo @pczekalski # | ||
| ===== Device Hardware Limitations ===== | ===== Device Hardware Limitations ===== | ||
| Line 16: | Line 15: | ||
| **Design Constraints and Strategies** | **Design Constraints and Strategies** | ||
| - | **1. Minimizing | + | **1. Minimising |
| - | IoT device design | + | IoT device design |
| - | * **Low-power computing devices: | + | * **Low-power computing devices: |
| * **Low-power communication protocols: | * **Low-power communication protocols: | ||
| * **Energy-efficient security mechanisms: | * **Energy-efficient security mechanisms: | ||
| Line 26: | Line 25: | ||
| Mechanisms such as sleep modes or duty cycling are integrated to deactivate idle components, thereby conserving energy. However, this often compromises quality of service (QoS). Striking a balance between energy savings and performance remains a design challenge. | Mechanisms such as sleep modes or duty cycling are integrated to deactivate idle components, thereby conserving energy. However, this often compromises quality of service (QoS). Striking a balance between energy savings and performance remains a design challenge. | ||
| - | **3 Energy Harvesting: | + | **3. Energy Harvesting: |
| Incorporating energy harvesting systems (e.g., solar, thermal, or kinetic energy) can supplement energy needs, reducing reliance on batteries. Yet, these systems face limitations, | Incorporating energy harvesting systems (e.g., solar, thermal, or kinetic energy) can supplement energy needs, reducing reliance on batteries. Yet, these systems face limitations, | ||
| Line 48: | Line 47: | ||
| * Adoption of advanced networking technologies such as 5G and edge computing to enhance speed and reduce latency. | * Adoption of advanced networking technologies such as 5G and edge computing to enhance speed and reduce latency. | ||
| * Employing hybrid connectivity solutions that combine wireless and wired networks for reliability. | * Employing hybrid connectivity solutions that combine wireless and wired networks for reliability. | ||
| - | * Optimizing | + | * Optimising |
| ===== Energy and Sustainability Issues ===== | ===== Energy and Sustainability Issues ===== | ||
| - | With billions of IoT devices deployed globally, the energy demands and environmental impact | + | With billions of IoT devices deployed globally, the systems' |
| **Energy and Environmental Challenges** | **Energy and Environmental Challenges** | ||
| + | |||
| **1. Massive Energy Demand:**\\ | **1. Massive Energy Demand:**\\ | ||
| - | IoT devices, networks, and data centers | + | IoT devices, networks, and data centres |
| **2. Sustainability Concerns:** | **2. Sustainability Concerns:** | ||
| - | * The production, operation, and disposal | + | * IoT devices' |
| * Data transmission and processing in cloud systems further exacerbate energy consumption. | * Data transmission and processing in cloud systems further exacerbate energy consumption. | ||
| **Mitigation Strategies** | **Mitigation Strategies** | ||
| - | * **Energy-Efficient Design: | + | * **Energy-Efficient Design: |
| * Energy Harvesting Integration: | * Energy Harvesting Integration: | ||
| * Circular Economy Practices: Promoting reuse, recycling, and environmentally friendly manufacturing processes. | * Circular Economy Practices: Promoting reuse, recycling, and environmentally friendly manufacturing processes. | ||
| Line 74: | Line 74: | ||
| **Challenges** | **Challenges** | ||
| - | * Lack of standardized | + | * Lack of standardised |
| - | * Scalability issues arise when expanding networks, particularly | + | * Scalability issues arise when expanding networks, particularly |
| **Solutions** | **Solutions** | ||
| * Adoption of open standards such as 6LoWPAN and MQTT to ensure compatibility. | * Adoption of open standards such as 6LoWPAN and MQTT to ensure compatibility. | ||
| - | * Utilizing | + | * Utilising |
| * Implementing modular designs that simplify network expansion. | * Implementing modular designs that simplify network expansion. | ||
| - | ===== Regulation, | + | ===== Regulation, |
| The absence of universal IoT standards impedes collaboration and innovation while increasing security vulnerabilities. | The absence of universal IoT standards impedes collaboration and innovation while increasing security vulnerabilities. | ||
| Line 92: | Line 92: | ||
| **Steps Forward**\\ | **Steps Forward**\\ | ||
| - | * Collaborative efforts by organizations | + | * Collaborative efforts by organisations |
| * National and international regulations to enforce compliance, protect consumer rights, and foster interoperability. | * National and international regulations to enforce compliance, protect consumer rights, and foster interoperability. | ||
| Line 101: | Line 101: | ||
| **Security Concerns**\\ | **Security Concerns**\\ | ||
| * Inadequate security mechanisms in low-cost devices expose them to attacks like data breaches, botnets, and device hijacking. | * Inadequate security mechanisms in low-cost devices expose them to attacks like data breaches, botnets, and device hijacking. | ||
| - | * The interconnected nature of IoT systems amplifies risks, as a single compromised device can jeopardize | + | * The interconnected nature of IoT systems amplifies risks, as a single compromised device can jeopardise |
| - | * Integrating strong security mechanisms in IoT is very challenging due to hardware constraints. | + | * Integrating strong security mechanisms in IoT is challenging due to hardware constraints. |
| * Some manufacturers ship devices without adequate security mechanisms, leaving them vulnerable to cyberattacks. | * Some manufacturers ship devices without adequate security mechanisms, leaving them vulnerable to cyberattacks. | ||
| Line 125: | Line 125: | ||
| ===== Cost Issues ===== | ===== Cost Issues ===== | ||
| - | High costs of design, deployment, and maintenance can discourage IoT adoption, particularly among smaller | + | High design, deployment, and maintenance |
| **Balancing Cost and Quality**\\ | **Balancing Cost and Quality**\\ | ||
| - | * Cheaper devices often compromise | + | * Cheaper devices often compromise quality and security, |
| * Strategies to lower costs without sacrificing essential features include economies of scale, open-source solutions, and government subsidies. | * Strategies to lower costs without sacrificing essential features include economies of scale, open-source solutions, and government subsidies. | ||
| Line 136: | Line 136: | ||
| **Challenges in Adoption** | **Challenges in Adoption** | ||
| - | * Stakeholders may resist due to concerns about cost, complexity, and privacy. | + | * Stakeholders may resist due to cost, complexity, and privacy |
| * Lack of education and awareness about IoT benefits. | * Lack of education and awareness about IoT benefits. | ||
| Line 143: | Line 143: | ||
| * Highlighting ROI and long-term benefits to stakeholders. | * Highlighting ROI and long-term benefits to stakeholders. | ||
| - | The potential of IoT to revolutionize | + | The potential of IoT to revolutionise |
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||
| - | + | ||