The Internet of Things IoT Applications
The Internet of Things IoT Applications
The Internet of Things IoT Applications
ScienceDirect
www.elsevier.com/locate/bushor
a
School of Computer Sciences, Western Illinois University, Stipes Hall 442F, Macomb, IL 61455-1390, U.S.A.
b
Olin Corporation, Clayton, MO, U.S.A.
KEYWORDS Abstract The Internet of Things (IoT), also called the Internet of Everything or the
Cloud computing; Industrial Internet, is a new technology paradigm envisioned as a global network of
Internet of Things; machines and devices capable of interacting with each other. The IoT is recognized as
Radio frequency one of the most important areas of future technology and is gaining vast attention
identification; from a wide range of industries. This article presents five IoT technologies that are
Real options; essential in the deployment of successful IoT-based products and services and
Supply chain discusses three IoT categories for enterprise applications used to enhance customer
management value. In addition, it examines the net present value method and the real option
approach widely used in the justification of technology projects and illustrates how
the real option approach can be applied for IoT investment. Finally, this article
discusses five technical and managerial challenges.
# 2015 Kelley School of Business, Indiana University. Published by Elsevier Inc. All
rights reserved.
0007-6813/$ see front matter # 2015 Kelley School of Business, Indiana University. Published by Elsevier Inc. All rights reserved.
http://dx.doi.org/10.1016/j.bushor.2015.03.008
432 I. Lee, K. Lee
In addition to manufacturers adoption of the IoT, waves, a tag, and a reader. The tag can store more
various service industries are in the process of data than traditional barcodes. The tag contains
adopting the IoT to increase revenue through en- data in the form of the Electronic Product Code
hanced services and become leaders in their mar- (EPC), a global RFID-based item identification sys-
kets. Disneys MagicBand is a new wristband with tem developed by the Auto-ID Center. Three types of
RFID chips that serves as a ticket and connects to tags are used. Passive RFID tags rely on radio fre-
Disneys data repository regarding park visitors. quency energy transferred from the reader to the
Krogers new IoT-based system, Retail Site Intelli- tag to power the tag; they are not battery-powered.
gence, is one complete retail platform of video Applications of these can be found in supply chains,
analytics, wireless devices, POS devices, handheld passports, electronic tolls, and item-level tracking.
sensors, IP cameras, and video management soft- Active RFID tags have their own battery supply and
ware that was designed to help customers have a can instigate communication with a reader. Active
better shopping experience by more easily finding tags can contain external sensors to monitor temper-
the products they want and saving time at checkout. ature, pressure, chemicals, and other conditions.
The adoption of this technology is rapidly gaining Active RFID tags are used in manufacturing, hospital
momentum as technological, societal, and compet- laboratories, and remote-sensing IT asset manage-
itive pressures push firms to innovate and transform ment. Semi-passive RFID tags use batteries to power
themselves. As IoT technology advances and increas- the microchip while communicating by drawing pow-
ing numbers of firms adopt the technology, IoT er from the reader. Active and semi-passive RFID tags
cost-benefit analysis will become a subject of great cost more than passive tags.
interest. Because of the potential but uncertain
benefits and high investment costs of the IoT, firms 2.2. Wireless sensor networks (WSN)
need to carefully assess every IoT-induced opportu-
nity and challenge to ensure that their resources are Wireless sensor networks (WSN) consist of spatially
spent judiciously. distributed autonomous sensor-equipped devices to
This article begins with a discussion of the five monitor physical or environmental conditions and can
essential IoT technologies used for the deployment cooperate with RFID systems to better track the
of successful IoT-based products and services and status of things such as their location, temperature,
identifies three IoT categories for enterprise appli- and movements (Atzori, Iera, & Morabito, 2010). WSN
cations. Then, it examines a net present value ap- allow different network topologies and multihop
proach and a real option approach widely used in the communication. Recent technological advances in
justification of technology projects and discusses low-power integrated circuits and wireless commu-
how real option valuation can be applied to IoT nications have made available efficient, low-cost,
investment. Finally, this article discusses five techni- low-power miniature devices for use in WSN applica-
cal and managerial challenges: data management, tions (Gubbi, Buyya, Marusic, & Palaniswami, 2013).
data mining, privacy, security, and chaos. WSN have primarily been used in cold chain
logistics that employ thermal and refrigerated pack-
2. Essential IoT technologies aging methods to transport temperature-sensitive
products (Hsueh & Chang, 2010; White & Cheong,
Five IoT technologies are widely used for the deploy- 2012). WSN are also used for maintenance and
ment of successful IoT-based products and services: tracking systems. For example, General Electric
deploys sensors in its jet engines, turbines, and
1. radio frequency identification (RFID); wind farms. By analyzing data in real time, GE saves
time and money associated with preventive main-
2. wireless sensor networks (WSN); tenance. Likewise, American Airlines uses sensors
capable of capturing 30 terabytes of data per flight
3. middleware; for services such as preventive maintenance.
to the specific IoT application. Middleware gained other vital signs of a package, including when it is
popularity in the 1980s due to its major role in opened and whether it was tampered with along the
simplifying the integration of legacy technologies way.
into new ones. It also facilitated the development of While device-to-device applications do not nec-
new services in the distributed computing environ- essarily require data visualization, more and more
ment. A complex distributed infrastructure of the human-centered IoT applications provide visualiza-
IoT with numerous heterogeneous devices requires tion to present information to end users in an intui-
simplifying the development of new applications tive and easy-to-understand way and to allow
and services, so the use of middleware is an ideal interaction with the environment. It is important
fit with IoT application development. For example, for IoT applications to be built with intelligence so
Global Sensor Networks (GSN) is an open source devices can monitor the environment, identify prob-
sensor middleware platform enabling the develop- lems, communicate with each other, and potentially
ment and deployment of sensor services with almost resolve problems without the need for human
zero programming effort. Most middleware archi- intervention.
tectures for the IoT follow a service-oriented ap-
proach in order to support an unknown and dynamic 3. IoT applications to enhance
network topology. customer value
2.4. Cloud computing Despite growing popularity of the IoT, few studies
have focused on categorization of the IoT for enter-
Cloud computing is a model for on-demand access to prises (e.g., Chui, Loffler, & Roberts, 2010). Based
a shared pool of configurable resources (e.g., com- on the technology trends and literature review,
puters, networks, servers, storage, applications, this article identifies three IoT categories for enter-
services, software) that can be provisioned as In- prise applications: (1) monitoring and control, (2)
frastructure as a Service (IaaS) or Software as a big data and business analytics, and (3) information
Service (SaaS). One of the most important outcomes sharing and collaboration. Understanding how these
of the IoT is an enormous amount of data generated three IoT categories can enhance the customer
from devices connected to the Internet (Gubbi value of an organization is a prerequisite to success-
et al., 2013). Many IoT applications require massive ful IoT adoption. This article next discusses the
data storage, huge processing speed to enable real- three IoT categories, along with an illustration of
time decision making, and high-speed broadband real-world IoT applications developed to enhance
networks to stream data, audio, or video. Cloud customer value.
computing provides an ideal back-end solution for
handling huge data streams and processing them for 3.1. Monitoring and control
the unprecedented number of IoT devices and hu-
mans in real time. Monitoring and control systems collect data on equip-
ment performance, energy usage, and environmental
2.5. IoT applications conditions, and allow managers and automated
controllers to constantly track performance in real
The IoT facilitates the development of myriad time anywhere, anytime. Advanced monitoring and
industry-oriented and user-specific IoT applications. control technologies such as smart grid and smart
Whereas devices and networks provide physical metering reveal operational patterns, spot areas of
connectivity, IoT applications enable device-to- potential improvement, or predict future outcomes
device and human-to-device interactions in a reli- and optimize operations, leading to lower costs and
able and robust manner. IoT applications on devices higher productivity.
need to ensure that data/messages have been re- The smart home is known to be at the forefront of
ceived and acted upon properly in a timely manner. innovation regarding IoT monitoring and control
For example, transportation and logistics applica- systems. The primary value propositions are family
tions monitor the status of transported goods such and property protection and energy savings. For
as fruits, fresh-cut produce, meat, and dairy prod- example, the Verizon Home Monitoring and Control
ucts. During transportation, the conservation status network uses a wireless communications technology
(e.g., temperature, humidity, shock) is monitored designed specifically for remote control applica-
constantly and appropriate actions are taken auto- tions in home automation. IoT-enabled home appli-
matically to avoid spoilage when the connection is ances and devices can be monitored and controlled
out of range. For example, FedEx uses SenseAware outside the users home through a computer, tablet,
to keep tabs on the temperature, location, and or smartphone. The Verizon Home Monitoring and
434 I. Lee, K. Lee
Control network allows users to adjust the lights, more personalized oral care routine. The interactive
control the climate, manage the security system, electric toothbrush records brushing habits with mo-
receive automatic event notifications, and even bile technology while giving mouth-care tips along-
lock and unlock doors. side news headlines. This innovation provides users
The IoT is also used to monitor and control various with unprecedented control over their oral care.
components in cars. The primary customer value Tests of the interactive electric toothbrush have
propositions are drivers personalized experience shown that when connected, brushing time increases
and satisfaction. Ford and Intel teamed up in 2014 from less than 60 seconds with a manual toothbrush
to explore new opportunities to personalize the user to 2 minutes and 16 seconds with an electric tooth-
experience using facial recognition software and a brush, surpassing the 2-minute session recommended
mobile phone app. The joint research project, by dental professionals.
called Mobile Interior Imaging, incorporates per-
ceptual computing technology to offer improved 3.3. Information sharing and collaboration
privacy controls and to identify different drivers
and automatically adjust features based on an in- Information sharing and collaboration in the IoT can
dividuals preferences. The in-car experience is occur between people, between people and things,
then personalized further by displaying information and between things. Sensing a predefined event
specific to the driver, such as his/her calendar, music, is usually the first step for information sharing
and contacts. The customer value propositions and collaboration. In the supply chain area, infor-
are appropriately integrated into the connected mation sharing and collaboration enhance situa-
car environment to provide another revenue stream tional awareness and avoid information delay and
for Ford. distortion. For example, if sensors are placed
throughout a retail store where refrigeration is nec-
3.2. Big data and business analytics essary, alerts can be sent to the store managers
mobile device whenever the refrigerators malfunc-
IoT devices and machines with embedded sensors tion. The manager can then check the employee
and actuators generate enormous amounts of data status report to see who is available and send
and transmit it to business intelligence and analytics task assignments to that employee via his or her
tools for humans to make decisions. These data are IoT-enabled mobile device.
used to discover and resolve business issuessuch To enhance information sharing and collaboration
as changes in customer behaviors and market with shoppers, Macys is deploying shopkicks shop-
conditionsto increase customer satisfaction, and Beacon technology, an enhanced mobile location-
to provide value-added services to customers. Busi- based technology that uses ultrasound Bluetooth
ness analytics tools may be embedded into IoT Low Energy (BLE). ShopBeacon provides shopkick
devices, such as wearable health monitoring sen- app users with personalized department-level
sors, so that real-time decision making can take deals, discounts, recommendations, and rewards.
place at the source of data. As shoppers enter Macys, shopBeacon reminds
The IoT and advances in business analytics now those shopkick app users who have opted in. This
make it possible to capture vast amounts of individual enhancement in Macys information sharing with
health data. The IoT enables healthcare service shoppers allows for increased consumer engage-
providers to personalize patient care. New IoT tech- ment and promotional and marketing relevancy that
nologies provide data about a patients everyday lead to higher customer satisfaction and increase
behaviors and health, creating opportunities for care revenues. In September 2014, following a pilot test
providers to influence patients far more frequently of the application, Macys decided to roll out shop-
and effectively. For example, Humanas Healthsense Beacon in all of its 4,000 U.S. locations. Other major
eNeighbor1 remote monitoring system reports retailers such as Target, American Eagle Outfitters,
changes in the members normal patterns of move- and JCPenney also partnered with shopkick and
ment and activity to Humana care managersvia in- launched shopBeacon in 2014. Due to competitive
home sensors that measure routine daily activities pressure, there is expected to be a rapid adoption of
with data analyticsto help trigger interventions and shopBeacon at other national retailers, too.
help prevent adverse events from escalating to emer-
gency room visits or hospital stays. 4. Evolution of the foundational IoT
IoT-based big data are also transforming the technologies
healthcare product industry. For example, Proctor
& Gamble developed the Oral-B Pro 5000 interactive Various types of IoT applications have emerged, and
electric toothbrush to provide users with a smarter, the willingness of enterprises to utilize them is
The Internet of Things (IoT): Applications, investments, and challenges for enterprises 435
growing rapidly. According to Bradley, Barbier, and size of industry sector in each region. In the United
Handler (2013), the IoTwill generate $14.4 trillion in States, $4.6 trillion of value is most prevalent in the
value; the combination of increased revenues and services area. However, in China, $1.8 trillion of
lower costs will migrate among companies and in- value is derived from rapid economic growth, mainly
dustries from 2013 to 2022. From an industry per- in the manufacturing sector.
spective, four industries make up more than half of Table 1 shows projected evolution in the area of
the $14.4 trillion in value. These leading four indus- foundational IoT technologies: network, software
tries in terms of value at stake include manufactur- and algorithms, hardware, and data processing.
ing at 27%; retail trade at 11%; information services The network is the backbone of the IoT. It refers
at 9%; and finance and insurance, also at 9%. Other to uniquely identifiable objects (things) and their
industries such as wholesale, healthcare, and edu- virtual representations in an Internet-like structure.
cation lag behind in terms of value generation, with Network technology is moving to unobtrusive wire-
a range between 1% and 7%. Much of the value for free communication technology that allows device-
manufacturers comes from greater agility and flex- to-device applications to be deployed more flexibly.
ibility in factories, and from the ability to make the Network technology is evolving toward a context-
most of workers skills. Additionally, a large amount aware autonomous network.
of the value for retailers comes from connected Objects rely on software to communicate effec-
marketing and advertising. Geographic distributions tively with each other and to deliver enhanced
of the value are heavily driven by each regions functionality and connectivity. Software should
relative economic growth rate and by the relative be developed with the IoTs interoperability,
the probability of success (p) and failure (1-p), the option value calculation, discounted back one
determine the expected payoffs using the project period.
value less the investment amount, and essentially While this example was simplified for readers from
work backward to determine the value of the option. non-finance backgrounds, more complicated scenar-
ios can be analyzed using the same principles. Many
5.4. Real options example IoT projects have unclear project scopes and goals
and are using breakthrough technologies; in such
Here we offer an example. A company is looking to scenarios, there is a higher risk of project failure
invest in new smart vending machines that will and greater irreversibility of investments than with
reduce costs and increase profits. Management be- traditional technology projects. Our example high-
lieves there is a probability of 0.55 that there will be lights the value of real option approaches to IoT
a high demand in this technology with a market projects.
value of $140m, and a probability of 0.45 that there
will be a low demand in this technology with a 6. Challenges in IoT development
market value of $40m. Figure 1 shows a decision
tree without real options. Based on the survey of IoT practices, this section
If the cost of investing in this technology at time discusses challenges in IoT development by enter-
zero is $100m and the discount rate is 8%, then from prises. As with any disruptive innovation, the IoT
a simple NPV calculation the value of the project is will present multiple challenges to adopting enter-
$12.04m, which the standard NPV rejects. prises. For example, due to the explosion of data
generated by IoT machines, Gartner (2014) suggested
Present Value of Cash In flow that data centers will face challenges in security, the
enterprise, consumer privacy, data itself, storage
140m0:55 40m0:45 management, server technologies, and data center
$87:96m
1:081 networking. This section discusses five technical and
NPV $87:96m $100m $12:04m managerial challenges: data management, data min-
ing, privacy, security, and chaos.
However, management can use a real option ap-
proach to evaluate this investment as a phased fi- 6.1. Data management challenge
nancing and scaling option. The company could start
with a pilot project and better learn the market over IoT sensors and devices are generating massive
time. In the following year, management could avoid amounts of data that need to be processed and
full investment of $100m into this smart vending stored. The current architecture of the data center
machine technology if the market turns out to be is not prepared to deal with the heterogeneous
$40m, and only invest in this technology if the nature and sheer volume of personal and enterprise
market turns out to be $140m. Therefore, manage- data (Gartner, 2014). Few enterprises would be
ment can value the option using a decision tree able to invest in data storage sufficient to house all
that takes the higher value as the exercised the IoT data collected from their networks. Con-
option. The option value of this project from the sequently, they will prioritize data for operations
real option perspective is ($140m $100m)*0.55 + or backup based on needs and value. Data centers
($0m)*0.45 = $22m/(1.08)1 = $20.37m. As long as the will become more distributed to improve process-
pilot project costs less than $20.37m, this pilot proj- ing efficiency and response time as IoT devices
ect with a following investment in the smart vending become more widely used and consume more
machine technology is worth doing. Figure 2 shows bandwidth.
6.2. Data mining challenge potential security threat escalates. Although the
IoT improves the productivity of companies and
As more data are available for processing and analy- enhances the quality of peoples lives, the IoT will
sis, the use of data mining tools becomes a necessity. also increase the potential attack surfaces for hack-
Data consist not only of traditional discrete data, but ers and other cyber criminals. A recent study by
also of streaming data generated from digital sensors Hewlett Packard (2014) revealed that 70% of the
in industrial equipment, automobiles, electrical me- most commonly used IoT devices contain serious
ters, and shipping crates. These streaming data are vulnerabilities. IoT devices have vulnerabilities
about location, movement, vibration, temperature, due to lack of transport encryption, insecure Web
humidity, and even chemical changes in the air. Data interfaces, inadequate software protection, and
mining tools can invoke corrective processes to ad- insufficient authorization. On average, each device
dress immediate operational issues or inform man- contained 25 holes, or risks of compromising the
agers of discoveries regarding competitors strategic home network. Devices on the IoT typically do not
moves and customers preference changes that use data encryption techniques.
will impact their short-term and long-term business Some IoT applications support sensitive infra-
activities. structures and strategic services such as the smart
Data need to be tamed and understood using grid and facility protection. Other IoT applications
computer and mathematical models. Traditional will increasingly generate enormous amounts of
data mining techniques are not directly applicable personal data about household, health, and finan-
to unstructured images and video data. Coupled cial status that enterprises will be able to leverage
with the need for the advanced data mining tools for their businesses. Lack of security and privacy will
to mine streaming data from sensor networks and create resistance to adoption of the IoT by firms and
image and video data, there is a shortage of individuals. Security challenges may be resolved by
competent data analysts. McKinsey Global Insti- training developers to incorporate security solutions
tute estimated that the United States needs (e.g., intrusion prevention systems, firewalls) into
140,000 to 190,000 more workers with analytical products and encouraging users to utilize IoT secu-
skills and 1.5 million managers and analysts with rity features that are built into their devices.
analytical skills to make business decisions based
on the analysis of big data (Manyika et al., 2011). 6.5. Chaos challenge
for the system as a whole, the chain reactions of Bradley, J., Barbier, J., & Handler, D. (2013). Embracing the
other connected devices can become disastrous. To Internet of Everything to capture your share of $14.4 trillion.
Cisco White Paper. Retrieved from http://www.cisco.com/
prevent chaos in the hyper-connected IoT world, web/about/ac79/docs/innov/IoE_Economy.pdf
businesses need to make every effort to reduce Chui, M., Loffler, M., & Roberts, R. (2010). The Internet of Things.
the complexity of connected systems, enhance McKinsey & Company. Retrieved from http://www.mckinsey.
the security and standardization of applications, com/insights/high_tech_telecoms_internet/the_internet_
and guarantee the safety and privacy of users any- of_things
Fichman, R., Keil, M., & Tiwana, A. (2005). Beyond valuation:
time, anywhere, on any device. Options Thinking in IT project management. California
Management Review, 47(2), 7496.
7. Conclusion Gartner. (2014, March 19). Gartner says the Internet of Things
will transform the data center. Retrieved from http://www.
gartner.com/newsroom/id/2684616
Because the IoT is such a recent development, there Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M. (2013).
is still a paucity of studies on the social, behavioral, Internet of Things (IoT): A vision, architectural elements,
economic, and managerial aspects of the IoT. This and future directions. Future Generation Computer Systems,
29(7), 16451660.
makes it very challenging for companies to make
Hewlett Packard. (2014, July 29). HP study reveals 70 percent of
informed decisions as regards IoT adoption/ Internet of Things devices vulnerable to attack. Retrieved
implementation. Our article is one of the first studies from http://www8.hp.com/us/en/hp-news/press-release.
on a conceptual model of IoT applications for enter- html?id=1744676#.VOTykPnF-ok
prises. In this article we identified three categories of Hsueh, C.-F., & Chang, M.-S. (2010). A model for intelligent
IoT applications: monitoring and control, big data transportation of perishable products. International Journal
of Intelligent Transportation Systems Research, 8(1), 3641.
and business analytics, and information sharing and Li, X., & Johnson, J. (2002). Evaluate IT investment opportunities
collaboration. We also presented investment oppor- using real options theory. Information Resources Management
tunities and investment evaluation with NPV and Journal, 15(3), 3247.
real options. Finally, we discussed five challenges Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R.,
in implementing IoT applications for enterprises. Roxburgh, C., et al. (2011, May). Big data: The next frontier
for innovation, competition, and productivity. McKinsey &
Company. Retrieved from http://www.mckinsey.com/
insights/business_technology/big_data_the_next_frontier_
Acknowledgment for_innovation
Sundmaeker, H., Guillemin, P., Friess, P., & Woelffle, S. (2010).
We offer special thanks to Editor Dr. Marc J. Vision and challenges for realising the Internet of Things.
Dollinger for his valuable comments and sugges- Accessible at http://www.researchgate.net/publication/
tions. 228664767_Vision_and_challenges_for_realising_the_
Internet_of_Things
TRUSTe. (2014). TRUSTe Internet of Things privacy indexUS
edition. Retrieved from http://www.truste.com/resources/
References privacy-research/us-internet-of-things-index-2014/
White, C. C., III, & Cheong, T. (2012). In-transit perishable
Atzori, L., Iera, A., & Morabito, G. (2010). The Internet of Things: product inspection. Transportation Research Part E: Logistics
A survey. Computer Networks, 54(1), 5278752805. and Transportation Review, 48(1), 310330.