Escolar Documentos
Profissional Documentos
Cultura Documentos
EdX and its Members use cookies and other tracking technologies for performance, ×
analytics, and marketing purposes. By using this website, you accept this use. Learn
more about these technologies in the Privacy Policy.
Security requirements
https://courses.edx.org/courses/course-v1:CurtinX+IOT2x+3T2018/courseware/94ab0cc8809644a8a4dd69b57efc914e/bcc96ff26c274535b1703f… 1/3
5/26/2019 Design a system - Further considerations | 5.1 Design implications | IOT2x Courseware | edX
IoT devices are often installed in their operating area and rarely (if ever) serviced or
updated.
This means that we are placing billions of additional devices onto the Internet, and
each one is a place for hackers to attack. We must design with security in mind.
Choose devices that are well supported by vendors, and include abilities to
remotely update drivers and rmware;
Physical design
The physical design is not just what your IoT device will look like, but an integral part of
the commercialisation process. A good rst step is to decide where the IoT device will
placed.
If indoors:
If installed outdoors:
https://courses.edx.org/courses/course-v1:CurtinX+IOT2x+3T2018/courseware/94ab0cc8809644a8a4dd69b57efc914e/bcc96ff26c274535b1703f… 2/3
5/26/2019 Design a system - Further considerations | 5.1 Design implications | IOT2x Courseware | edX
As we have seen,
there are a plethora of
choices in the
marketplace for micro
prototyping systems,
and no one platform
will t all applications.
One thing that can help
is to always adopt
industry standards, so
that a transition to a
more suitable platform
can be made
if required at a future
date.
https://courses.edx.org/courses/course-v1:CurtinX+IOT2x+3T2018/courseware/94ab0cc8809644a8a4dd69b57efc914e/bcc96ff26c274535b1703f… 3/3