A Cost Estimation Approach For IoT Projects PDF
A Cost Estimation Approach For IoT Projects PDF
1. Introduction
The Internet of things (abbreviated as IoT) is a computing concept which started life as the title of a
presentation made by Kevin Ashton at Procter & Gamble (P&G) in 1999. Originally the term was
closely connected with radio frequency identification (RFID) as a network of physical objects that
contain embedded technology to interact with their internal states or the external environment. The
terms coined by Kevin Ashton were used in the article devoted to the Internet of things which
appeared 5 years later. This article explained varied applications of the Internet of Things (IoT)
changing simple homes into smart homes and providing automation of the processes made by home
appliances and "things" (for example, medical identification tags). The idea of everyday physical
objects and devices being connected to a computer network using the Internet protocol suite which
was considered in the article has allowed the concept to become increasingly popular. But its real
resurgence occured in 2010 when the number of mobile-connected devices exceeded the world's
population. The technology acquired maturity and became the basis for "foggy calculations". The
concept broadened the sphere of its application having penetrated into the field of industrial facilities.
Today the internet of things is understood as a concept of designing computer networks which
consist of "things" interacting with each other and the external environment [1]. In the context of
technology, things are physical or virtual objects which can be identified and integrated into
communication networks [2].
Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution
of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.
Published under licence by IOP Publishing Ltd 1
SCSET 2018 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1176 (2019) 042083 doi:10.1088/1742-6596/1176/4/042083
Thus, obtaining data, things can interact with each other in order to analyze the information and
store it in their own network, however all actions, which can be carried out by devices within one
network, are coordinated by human. This aspect is important from a security perspective, as this term
is also considered regarding technology and social development.
Rapid growth of the concept popularity is connected, first of all, with the development of wireless
networks, cloud computing, active transition to IPv6 (improved version of the IP protocol) and
development of software-defined networking [3, 4].
2. The Internet of things in conditions of modern digital economy
The most basic taxonomy of IoT technologies includes three main components:
1) data processing;
2) identification;
3) measurement.
The first component covers possibilities of networks (wired and wireless) ensuring that the Internet
of things will react effectively in the case of slow Internet speeds, adapt and achieve fault tolerance.
Identification is a basis for the concept of the Internet of things. Various types of optical identifiers
and location sensors are embedded in diverse IoT devices. Each identifier has to perform a unique
function. The traditional identifier for the object connected to network is MAC address of a network
adapter.
The idea of the Internet of things consists in obtaining information from the external environment;
therefore the technology has to possess measuring instruments, translating data from outside the world
into machine meaningful and readable form. When all objects are combined in one network it is
possible to use this data for the creation of the system of inter-machine interaction.
Experiences present new challenges for the interaction between humans and devices when the later
will detect human presence or foresee his/her wishes in order to perform relevant instruction or
recommendation. This is the most common concern expressed by practitioners contributing to the
development of artificial intelligence and computer-based technologies. The Internet of things
promises big change when the machines are able "to learn" and create necessary favorable conditions
for human beings [5].
As it was mentioned the Internet of things has penetrated deep into the sphere of industrial facilities.
Many companies are starting to reconsider their own ignorant view and look for the ways to use new
approach of business management with the Internet of things [6-8]. The reason for this tendency is the
desire to get closer to the customers who use their personal devices actively. Besides simple
conveniences, such as automatic sliding doors that automatically open and close as a customer
approaches them, the technology enables using biometric data for identification purposes and granting
access permissions to these or those services. Devices provide customers with expected solutions on
their terms and their schedule. Thus, the Internet of things is an innovation capable to capture the
sphere of marketing and entertainments, as its instruments are able to satisfy customer needs
implementing mood recognition technology. It is possible to draw a conclusion that in the near future
the Internet of things will become a mega trend that will influence everything from our daily personal
life to businesses.
There are a number of IoT market estimation methodologies to choose from. That is why these
estimations would seem inexact. At the same time the situation gets totally absurd – there is much
information about the exploration of the market in terms of size and profitability without specifying
the method used for the assessment. As a result we have inaccurate information that complicates the
assessment of complex IoT systems regarding economic characteristics of its development. According
to the latest forecast, the size of the market of IoT is projected to total $ 4,3 trillion by 2020, that is
456% more than a segment share in 2014. Thus, estimates of the future market size of the IoT cover a
broad range, but most pundits agree it will dwarf any other market. Taking into account the basic
technology components supporting its functioning, such instruments as cloud servers, Internet and new
standards for inter-machine interactions are key to its further development.
2
SCSET 2018 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1176 (2019) 042083 doi:10.1088/1742-6596/1176/4/042083
3
SCSET 2018 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1176 (2019) 042083 doi:10.1088/1742-6596/1176/4/042083
4) Qualification of employees. For fast and effective work each participant of the project should
have knowledge and skills necessary or helpful to solve the problem or complete the task during the
project development and implementation. As a rule, to obtain an objective estimate and forecast the
associated expenses it is necessary to consider a situation where initially the employees’ skill levels
are lower than those required.
5) Planning and Writing Specifications. It is necessary to define all restrictions to the project in
accordance with the written agreement with the client. Any additional works, not included in the terms
of the written contract, can create higher total project costs.
6) Project previews are intended to provide the customers an opportunity to find changes in
requirements. The more often the project is shown and discussed, the easier for the developers to take
measures if the customer requirements change. The situation when a change in requirements is fraught
with a variety of risks to go over budget and suffer schedule delays.
7) Wrong choice of technologies. Wrong approach to a solution is a key reason for cost overruns.
To minimize this criterion, additional estimates of expenditures for learning new technologies (which
are included in the total cost of the project) are often made.
Thus, the project budget is allocated as follows (table 1).
Table 1. Percentage of budget allocated for different stages of the project (prepared by the authors).
Percentage Stage Description
ratio
20% Specification Defining requirements and conditions of the project
25% Design Development and verification of the project
20% Development Code writing and test execution
35% Integration and testing Combination of units and testing as groups in multiple ways
These estimates are made without taking into consideration software maintenance that is the
modification of a software product to correct faults and improve performance. Very often maintenance
consumes a large part of the project budget thus increasing the importance of previews.
Now we will consider the above-mentioned in the context of IoT. Small amount of transmitted
data and simplicity are the advantages of a design stage. As the rule, the amount of data transmitted
from sensors do not exceed 1 megabyte as much information is presented in the form of prime
numbers, which are needed for the device to correct current behavior and ongoing work.
Simplicity is a key requirement for IoT realization. Users prefer devices providing the most user-
friendly experience. To satisfy customer preferences clear and simple external interface is needed.
The first criterion which determines the total cost of IoT project is scalability. Scalability is a non-
functional property of a system that describes the ability to appropriately handle increasing workloads.
It can be theoretically enlarged to thousands of devices in one network. Thus there should not occur
unforeseen errors or malfunction of a system when connecting a new device. It is very important, as
the concept key is interaction between the objects sharing the same network. Therefore it is necessary
to take into consideration the volume of the following databases (table 2).
So, we will summarize the intermediate results:
the majority of identical projects have similar databases, this simplifies the work of developers,
thus reducing total project costs;
the databases of identical projects are characterized by huge volumes, therefore, we need to
use more labor-intensive testing models and support integrated databases, i.e., incur additional
costs.
The area of endeavor concerned with safeguarding connected devices and networks in the Internet
of things is IoT security [9]. Besides breaching confidentiality of traditional Internet communications
(repetitions, interception, distortion of information, etc.), there appear problems with protection of a
consumer component [10]. The greatest danger to networks comes from devices based on inter-
machine interaction (M2M). A program written by a human cannot be considered absolutely faultless
and safe. There is a maintenance phase directed to correction of errors for any system. Sensors in
4
SCSET 2018 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1176 (2019) 042083 doi:10.1088/1742-6596/1176/4/042083
Internet devices are not an exception. With the increasing prevalence of such devices in our life the
threat to data security will grow, even for the most insignificant information. This can present a
potential danger to individuals and legal entities.
Table 2. Database examples and description (prepared by the authors).
Database title Information stored
Contains both temporary and permanent information. As a rule, information
about the IoT user, i.e., information associated with the user account. Data are
taken in two cases:
1) To check whether a device has to react to a person.
2) To check the way it has to react if information about the person is in the
User information database.
The activity of the person is tracked and necessary device is put into operation,
based on the person location. If a person is not in sensor sensitivity zone the
device enters a power saving mode (for this reason the Internet of things is often
User location used to reduce power supply costs in large enterprises).
Store information about the type of equipment available in the shared network.
First of all, the importance of this database consists in safety and preservation of
Authorized devices confidential information.
Contains authentication keys. They are used to define whether the user is
authorized to access or not and for obtaining information about the user and the
User authentication user location.
As to IoT, it is worth mentioning a key component in the concept name – the Internet, which is
characterized by coverage over very wide areas and penetration. Information has to be transmitted
through long distances without loss and distortions. Besides it has to overcome obstacles, as often we
need to use the shared network being, for example, underground (underground parking). The solution
to the problem is Low-Power Wide-Area Network technology (abbreviated as LPWAN). This
technology was developed for inter-machine interaction and can provide interaction between different
devices over distances of 30-50 km. One station can cover thousands of square kilometers and
relatively low volumes of data transmitted reduce network maintenance costs. Thus LPWAN meets all
required criteria and significantly reduces the total cost of the Internet of things, allowing to focus on
information security and proper work of databases.
LPWAN is used as an alternative to cellular networks which were considered a good candidate for
the wireless IoT-environment. Unlike its analog, the total cost of LPWAN modules is two times
cheaper than of LTE modules, thus the costs of using LPWAN for IoT application is much lower, than
construction of any LTE network.
The devices of an Italian open source computer hardware and software company Arduino can be
used to develop IoT projects. These devices are well-known thanks to their flexibility as they can
interact with buttons, motors, diodes, cameras, loudspeakers, GPS, Internet and even smartphones and
TVs. These devices combine flexible low cost hardware and software that is free at the moment. Due
to simplicity of training to work with hardware and software the Arduino hardware/software platform
for building digital devices and interactive objects has huge community of users. Moreover Arduino is
an open source, i.e., everyone can learn to design. Company services are well consumed because of
the clear interface and open code to create programs. Due to availability and simplicity, clients decide
to install them on their own. What is the reason? First of all, it is much cheaper and easier, and,
secondly, most companies raise prices for installation services, artificially increasing the total costs of
a product. The consumers have to choose: to install applications on their own, or use services offered
by the qualified professionals. The former option appears to be more preferable. That is the reason
why this aspect is not profitable for most companies providing a wide variety of managed IoT-oriented
services; however the product gains popularity among clients.
5
SCSET 2018 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1176 (2019) 042083 doi:10.1088/1742-6596/1176/4/042083
Thus total costs essentially change depending on volumes of information stored in the databases,
and costs of information security. The dependence is quite simple: the more information, the more
difficult it is to ensure safety for each component that can be stolen for causing moral and physical
harm.
At the same time costs of information security depend on complexity of the system, which needs to
provide reliable safety of data. Below is the graph showing dependence of information security costs
on complexity of an information system prepared by the Vympel company (figure 1).
6
SCSET 2018 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1176 (2019) 042083 doi:10.1088/1742-6596/1176/4/042083
7
SCSET 2018 IOP Publishing
IOP Conf. Series: Journal of Physics: Conf. Series 1176 (2019) 042083 doi:10.1088/1742-6596/1176/4/042083
4. Conclusion
The costs of the Internet of things are measured mostly by the amount of information stored in
databases. Low price of installation and LPWAN technology allows to reduce costs of the Internet
component.
Within the range of IoT problems special emphasis is made on engineering economics. The
program for studying the aspects of cost management aimed at identifying an adequate parametric
model and included calculations using Program Evaluation and Review Technique that enabled to
draw a conclusion about the IoT project cost.
Developing the concepts of the algorithmic software cost estimation model COCOMO and the
parametric cost estimation method Use Case Points, it is possible to ascertain that the costs of
information security will grow depending on the amount of information, thus making the importance
of this aspect obvious. Moreover the authors could reveal some peculiarities of the mechanism for
reducing cost of the Internet component.
References
[1] Wang Z, Li W and Dong H 2017 Review on open source operating systems for internet of things
J. Phys.: Conf. Ser. 887 art. no. 012044
[2] Ibarra-Esquer J E, González-Navarro F F, Flores-Rios B L, Burtseva L and Astorga-Vargas M A,
2017 Tracking the evolution of the internet of things concept across different application domains
Sensors (Switzerland) 17 art. no. 1379
[3] Sethi P and Sarangi S R 2017 Internet of Things: Architectures, Protocols, and Applications
Journal of Electrical and Computer Engineering art. no. 9324035
[4] Zhang J, Guo Z-L, Chen S-S, Shao B-Q and Wang Y-T 2017 IoT-based detection for tropical
flower Proc. Int. Conf. Information System and Artificial Intelligence ISAI 2016 (Hong Kong;
China) (IEEE) pp 219–222
[5] Amri Y and Setiawan M A 2018 Improving Smart Home Concept with the Internet of Things
Concept Using RaspberryPi and NodeMCU Material Science and Engineering: Conf. Ser. 325 art.
no. 012021.
[6] Joni K, Haryanto and Rohim D F 2018 Smart Garbage Based on Internet of Things (IoT) J. Phys.:
Conf. Ser. 953 art. no. 012139
[7] Zhang A-L 2017 Research on the architecture of internet of things applied in coal mine Proc. Int.
Conf. Information System and Artificial Intelligence ISAI 2016 (Hong Kong; China) (IEEE) pp
21–23
[8] Tedeschi S, Rodrigues D, Emmanouilidis C, Erkoyuncu J, Roy R and Starr A 2018 A cost
estimation approach for IoT modular architectures implementation in legacy systems Procedia
Manuf. 19 pp 103–110
[9] Jog V V and Murugan T S 2018 A Critical Analysis on the Security Architectures of Internet of
Things: The Road Ahead Journal of Intelligent Systems 27 pp 149–162
[10] Sha K, Wei W, Andrew Yang T, Wang Z and Shi W 2018 On security challenges and open issues
in Internet of Things Future Gener. Comput. Syst. 83 pp 326–337