The document outlines several key issues and challenges with IoT including design issues related to network stability, power management, and memory management. Technical issues involve wireless communication convergence, interoperability, scalability, and lightweight protocols. Security issues pertain to authentication, privacy, weak default passwords, and ensuring user privacy and device trustworthiness.
The document outlines several key issues and challenges with IoT including design issues related to network stability, power management, and memory management. Technical issues involve wireless communication convergence, interoperability, scalability, and lightweight protocols. Security issues pertain to authentication, privacy, weak default passwords, and ensuring user privacy and device trustworthiness.
The document outlines several key issues and challenges with IoT including design issues related to network stability, power management, and memory management. Technical issues involve wireless communication convergence, interoperability, scalability, and lightweight protocols. Security issues pertain to authentication, privacy, weak default passwords, and ensuring user privacy and device trustworthiness.
• Overall power consumption by sensory nodes in IoT should be minimal,should consider fluctuations • Higher power backup • Power fluctuations ➢ Memory management Challenge: • Choosing right memory and data structure. ➢ Selection of components ,products with good shielding , selection of protocols puts up a lot of challenges during design phase . Technical issues • In wireless communication, Convergence of GSM, UMTS, Wi-Fi, Bluetooth, WPAN. • These technologies use different communication standards and have different communication bandwidth requirement. • interoperability issues • Scalability of Networks(Unbounded no. of devices as compared to traditional network) • Processing and Computing; Technical issues … •Need of lightweight protocols for IoT which minimize energy consumption. • Things- Computers, sensor nodes, people, vehicles, medicines, books etc. • Things should be uniquely identified for the addressing capabilities and for providing means to communicate with each other • Unique identification of devices using IPv4 and IPv6. Security issues
• Authentication, privacy, trustworthiness, confidentiality, end
to end security • User Privacy. • Weak Default Passwords. • Many IoT devices come with original default passwords that are weak. • Although it is recommended that you change the passwords, some IT leaders fail to take this simple step. • A weak, easy-to-guess password could leave an IoT device vulnerable attack. • This is issue so prevalent that California banned default passwords in 2018.