New Frontiers in IoT: Networking, Systems, Reliability, and Security Challenges

Saurabh Bagchi, Tarek F. Abdelzaher, Ramesh Govindan, Prashant Shenoy, Akanksha Atrey, Pradipta Ghosh, Ran Xu

Research output: Contribution to journalArticlepeer-review

Abstract

The field of IoT has blossomed and is positively influencing many application domains. In this article, we bring out the unique challenges this field poses to research in computer systems and networking. The unique challenges arise from the unique characteristics of IoT systems such as the diversity of application domains where they are used and the increasingly demanding protocols they are being called upon to run (such as video and LIDAR processing) on constrained resources (on-node and network). We show how these open challenges can benefit from foundations laid in other areas, such as fifth-generation network cellular protocols, machine learning model reduction, and device-edge-cloud offloading. We then discuss the unique challenges for reliability, security, and privacy posed by IoT systems due to their salient characteristics which include heterogeneity of devices and protocols, dependence on the physical environment, and the close coupling with humans. We again show how open research challenges benefit from the reliability, security, and privacy advancements in other areas. We conclude by providing a vision for a desirable end state for IoT systems.

Original languageEnglish (US)
Article number9136673
Pages (from-to)11330-11346
Number of pages17
JournalIEEE Internet of Things Journal
Volume7
Issue number12
DOIs
StatePublished - Dec 2020

Keywords

  • Foundations
  • Internet of Things
  • path forward
  • reliability and security challenges
  • systems and networking challenges

ASJC Scopus subject areas

  • Signal Processing
  • Information Systems
  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'New Frontiers in IoT: Networking, Systems, Reliability, and Security Challenges'. Together they form a unique fingerprint.

Cite this