Study of Various Known Bugs and Other Challenges Associated with IoT System Development
Keywords:
IoT, Software Engineering, Data Mining, and Real-World EvidenceAbstract
Embedded systems and smart homes are only two examples of the fast expanding use cases for Internet of Things (IoT) infrastructure. There has been no in-depth research of the difficulties developers face while working on the Internet of Things despite its rising popularity and widespread use. We provide the first comprehensive assessment of the issues and difficulties encountered by IoT developers via a large-scale empirical inquiry. A total of 5,565 bug reports from 91 typical IoT project repositories were gathered, and from those, a random sample of 323 were classified according to failure types, underlying causes, and physical locations of problematic components. To learn more about IoT problems and the difficulties faced by IoT developers, we also conducted nine interviews with industry insiders. In the end, we polled 194 IoT developers for confirmation and further information. Based on our findings, we offer the first bug classification for IoT systems. We focus on the most prevalent types of bugs that affect IoT systems, along with their origins, relationships, and the difficulties and obstacles that programmers often encounter while fixing them.
References
- Demeter, Minerva, and D. As stated by Rotondi in the IEEE Internet Initiative volume, “Towards a definition of the internet of things (IoT),” 1, no. 1, pp. 1-86, 2015.
- M. Hung, “Leading the IoT, Gartner Insights on How to Lead in a Connected World,” Gartner Research, 2017, pp. 1–29.
- F. Data from Schwandt, “Internet of Things (IoT) Connected Devices Installed Base Worldwide from 2015 to 2025 (in billions),” Statista, 2016.
- F. Corno, Louise De Russis, and John R. P. Sáenz, “How is open source software development unique in mainstream IoT endeavors?' IEEE Access, vol. 8, pp. 28 337-28 348, 2020.
- T. It was found by W. Hnat, V. Srinivasan, J. Lu, T. I. Sookoor, R. Dawson, J. Stankovic, and K. Whitehouse, “The hitchhiker's guide to successful residential sensing deployments,” Proceedings of the 9th ACM Conference on Embedded Networked Sensor Systems, 2011, pp. 232-245.
- F. Corno, Louise De Russis, and John R. “On the challenges novice programmers experience in developing IoT systems: A survey,” P. Sáenz, Journal of Systems and Software, vol. 157, p. 110389, 2019.
- LR Stojkoska & K. V. Trivodaliev, “A review of internet of things for smart home: Challenges and solutions,” Journal of Cleaner Production vol. 140, pp. 1454-1464, 2017.
- Y. Chen, Zhen-Zhen, Hui-Yu, and Jian-Ping. Xu, “Application of fault tree analysis and fuzzy neural networks to fault diagnosis in the internet of things (IoT) for aquaculture,” Sensors, volume, page. 17, no. 1, p. 153, 2017.
- H. Together, Liang, Zhao, Wang, and H. Liu, “Understanding and detecting performance and security bugs in IoT oses,” 17th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD), 2016. IEEE, 2016. pp. 413–418.
- G. The authors (Jahangirova, N. Humbatova, G. Bavota, V. Riccio, A. Stocco, etc)
- P. This article cites the 2019 arXiv publication by Tonella, “Taxonomy of real faults in deep learning systems,” as its primary citation.
- Z. Xia, and L. Cai, “Bug characteristics in blockchain systems: a large-scale empirical study,” in IEEE/ACM MSR 2017: The 14th International Conference on Mining Software Repositories. In 2017 edition of IEEE, pages 413–424.
- M. By E. Joorabchi, A. Mesbah, and P. According to Kruchten, “Real challenges in mobile app development,” was published in the 2013 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement. 15-24 in IEEE's 2013 publication.
- According to “The three software stacks required for IoT architectures,” written by I. W. Group et al. in 2016, all IoT architectures must include all three.
- Javed, Muhammad K. Afzal, Muhammad Sharif, and B.-S. Kim, “A Comparative Review of the Support for Internet of Things (IoT) Operating Systems, Networking Technologies, Applications, and Challenges,” IEEE Communications Surveys & Tutorials, vol. 20, no. 3, pp. 2062-2100, 2018.
- H. The authors Tschofenig, Arkko, and D. According to McPherson, “Architectural Considerations in Smart Object Networking,” Internet Engineering Task Force, Fremont, CA, USA, 2014.
- W. A group of researchers led by Zhou found that Y. See: Zhang, “Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms,” in Proceedings of the 28th USENIX Security Symposium (USENIX Security), 2019, pp. 1133-1150.
- 2018; https://github.com/ggravlingen/pytradfri/issues/135 “Lamps not identified as lamps with f/w 1.3.14,” Github.
- Both Makhshari and A. August 2020, Mesbah, https://github.com/IoTSEstudy/ IoTbugschallenges, IoT Bugs and Development Challenges Artifact Package.
- Topics are a great way to organize your repository, https://help.github.com/en/github/administering-a-repository/.
- classifying-your-repository-with-topics.
- H. In a similar vein to Borges, M. What's the value of a star on GitHub?,” T. Valente. a study of repository-starring habits on GitHub, “Journal of Systems and Software,” vol. 146, pp. 112-129, 2018.
- L. X. Wang, Y. Zhou, and C. Liu; Z. Li; C. Tan; C. Liu; X. “Bug characteristics in open source software,” by Zhai. Empirical software engineering, vol. 19, no. 6, pp. 1665-1705, 2014.
- For this study, Avizienis, J.-C. Laprie, B. Randell, and C. In “Basic Concepts and Taxonomy of Dependable and Secure Computing,” by Landwehr (IEEE Transactions on Dependable and Secure Computing, Vol. 1, no. 1, pp. 11-33, 2004.
- O. Knowledge solutions, Serrat's “The five whys technique,” 2010. Pages 307 and 310, Springer, 2017.
- “Qualitative methods in empirical studies of software engineering,” by B. Seaman, IEEE Transactions on software engineering, vol. 25, no. 4, pp. 557-572, 1999.
- P. Fusch, I., and L. Are we there yet?,” R. Ness. qualitative study reaches a point of data saturation, The Qualitative Report, Vol. 20, no. 9, p. 1408, 2015.
- M. Purposive sampling was first described by D. C. Tongco in his article “Purposive sampling as a tool for informant selection,”
- Research on ethnobotany and its practical uses, volume. 5, pp. 147-158, 2007.
- J. Morse, M. 2015. “Data were saturated...”
- The three of you, L. Johnson: “At what point do we have enough interviews? data saturation and variation in a field experiment,” Field Methods, volume, number. 18, no. 1, pp. 59-82, 2006.
- L. F. Figueira Filho Singer and M.-A. Storey, “Software engineering at the speed of light: how developers stay current using Twitter,” 36th International Conference on Software Engineering, 2014, pp. 211-221.
- M. Aniche, Christian Treude, Ian Steinmacher, Ian Wiese, Giuseppe Pinto, Michael A. Storey, and Michael J. 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE), A. Gerosa, “How contemporary news aggregators help development communities shape and share knowledge.” 499–510 (IEEE, 2018).
- J. All three authors (Henrich, S. J. Heine, and A. The most peculiar people on Earth?” — Norenzayan.Science of the Brain and Behavior, Vol. 33, no. 2-3, pp. 61-83, 2010.
- Coley and R. O'Connor, “Using grounded theory to understand software process improvement: A study of Irish Software Product Companies,” in Information and Software Technology, vol. 49, no. 6, pp. 654-667, 2007.
- M. The authors (Usman, R. Britto, J. Börstler, and E. As Mendes et al. detail in “Taxonomies in Software Engineering: A Systematic Mapping Study and a Revised Taxonomy Development Method,” published in Information and Software Technology, volume 59, issue 1, pages 61-80. 85, pp. 43-59, 2017.
- H. Kwasnik, “The role of classification in knowledge representation and discovery,” GSLIS. A school in Illinois. .., 1999.
- vyshwanara, “Potential Time Lag Issues Due to Raspberry Pi's Missing Hardware Clock,” 2018. [Online]. Lack of a hardware clock in the Raspberry Pi might cause scheduling problems; for more information, see https://blog.pisignage.com/.
- M. Together, Alhanahnah, C. Stevens, and H. Bagheri, “Scalable analysis of interaction threats in IoT systems,” in Proceedings of the 29th Annual ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020, pages 272-285.
- M. Data Mining: Concepts and Techniques, by J. Pei Kamber et al. San Francisco: Morgan Kaufmann Publishers, 2001, volume. 2.
- J. Dias, Couto, Paiva, and H. S. Ferreira, “A brief overview of existing tools for testing the internet-of-things,” in 2018 IEEE International Conference on Software Testing, Verification, and Validation Workshops (ICSTW). Page numbers: IEEE, 2018.
- P. Pontes, Lima, and Pontes, J. For example, see P. Faria, “Test patterns for IoT,” in the 2018 proceedings of the 9th ACM SIGSOFT International Workshop on Automating TEST Case Design, Selection, and Evaluation. Pages 63–66.
- IOTIFITY [Online]; “Advanced IoT system simulation engine and test automation for enterprise IoT apps.” To access, visit https://iotify.io/.
- Authors: V. Looga, Z. Ou, Y. Deng, and A. Ylä-Jääski, “Mammoth: A Massivescale Emulation Platform for the Internet of Things,” 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems, vol. 3. Reference: IEEE, 2012. pp. 1235–1239.
- M. “Arduinounit,” by Murdoch. 2013. [Online]. Get it at: https://github.com/. com/mmurdoch/arduinounit
- Kravets, “Platformio: An Open Source Ecosystem for IoT Development,” PlatformIO.[On-line]. Platformio: https://platformio.com/. org. [Referenced on September 25, 2019] 2018.
- “Fit IoT-lab: A large scale open experimental IoT testbed,” by R. Pissard-Gibollet, F. Saint-Marcel, G. Schreiner, J. Vandaele, et al., in 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT). Specifically: IEEE, 2015. p.
- It was Voas, Kuhn, and P. “Testing IoT systems,” by Laplante, at 2018 IEEE Symposium on Service-Oriented System Engineering (SOSE). Pages 48–52 in IEEE's 2018 publication.
- Song, V. “The Neverending Death of Smart Home Gadgets,” March 2020. [Online]. For more information on the inevitable demise of smart home devices, see https://gizmodo.com/ the-never-ending-death-of-smart-home-gadgets-1842456125.
- P. Paul, P. Jabangwe, P. Nguyen-Duc, and P. XP Workshops, 2017, pp. 11-1, Abrahamsson, “Security challenges in IoT development: a software engineering perspective.”
- Y. Xiao, Yujia Jia, Cheng Xiao, Yu Jia, Jia Yu, and Wei Xue. Author: Lv, “Edge computing security: State of the art and challenges,” Proceedings of the IEEE, vol. 107, no. 8, pp. 1608-1631, 2019.
- G. A. Hernandez, D. Buentello, Y. According to Jin in “Smart Nest Thermostat: A Smart Spy in Your Home,” published in Black Hat USA, issue 2015, 2014.
- Z. X. Ling, K. Wu, C. Gao, Y. Xu, J. Luo, and X. Reference: Fu, “Security vulnerabilities of internet of things: A case study of the smart plug system,” IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1899-1909, 2017.
- S. With the help of M. Siddiqi, R. Notra, V. Sivaraman, H. H. Gharakheili, and R. Boreli, “An Experimental Study of Security and Privacy Risks with Emerging Household Appliances,” 2014 IEEE Conference on Communications and Network Security. IEE, 2014, pages 79–84.
- Asher Shamir, Alexander Weingarten, Daniel Ronen, and C. O'Flynn, “IoT Goes Nuclear: Creating a Zigbee Chain Reaction,” IEEE Symposium on Security and Privacy (SP), 2017. Page numbers: IEEE, 2017.
- R. Researchers Goyal, N. Dragoni, and A. Spognardi, “Mind the tracker you wear: a security analysis of wearable health trackers,” in Proceedings of the 2016 ACM Symposium on Applied Computing, pp. 131-136.
- B. Both Fouladi and S. “Honey, i'm home!” Ghanoun exclaimed.Zwave home automation system hacking,” Black Hat USA 2013.
- Z. We thank B. Celik, G. Tan, and P. Author: D. McDaniel Citation: “IoTguard: Dynamic enforcement of security and safety policy in commodity IoT.” in NDSS, 2019.
- Z. For this article, we consulted the expertise of B. Celik, P. McDaniel, and G. Annual Technical Conference (USENIX ATC), 2018, Tan, “Soteria: Automated IoT safety and security analysis,” pages 147-158.
- A. Alqassem and D. Reference: Svetinovic, “A taxonomy of security and privacy requirements for the internet of things (IoT),” 2014 IEEE International Conference on Industrial Engineering and Engineering Management. Reference: IEEE, 2014. p. 1244-1248.
- S. Zhang, Z. Li, Y. Zhang, Q. Deng, S. Ray, and Y. Journal of Hardware and Systems Security, vol. Jin, “Internet-of-Things Security and Vulnerabilities: Taxonomy, Challenges, and Practice,” 2, no. 2, pp. 97-110, 2018.
- Ahmad, F. Bouquet, E. Fourneret, F. Le Gall, and B. Reference: Legeard, “Model-based testing as a service for IoT platforms,” in International Symposium on Leveraging Applications of Formal Methods. 727-742 in Springer (2016).
- P. R. Rosenkranz, M. Wählisch, E. Baccelli, and L. Ortmann, “A distributed test system architecture for open-source IoT software,” in 2015's Workshop on IoT issues in Mobile and Industrial Systems' proceedings, pp. 43-48.
- A. Garca-Domnguez, G. Gutiérrez-Madroal, and I. Software: Practice and Experience, Vol. Medina-Bulo, “Evolutionary Mutation Testing for IoT with Recorded and Generated Events,” p. 49, no. 4, pp. 640- 672, 2019.
- According to research by Gutiérrez-Madroal, I. Medina-Bulo, and J. “IoT-teg: Test event generator system,” by J. Domnguez-Jiménez, appeared in Journal of Systems and Software volume 2017. 137, pp. 784-803, 2018.
- B. The authors Morin, N. Harrand, and F. IEEE Software, vol. Fleurey, “Model-based software engineering to tame the IoT jungle,” 2016. 34, no. 1, pp. 30-36, 2017.
- Le Pallec, Radu Mateescu, Laurent Noirie, and Gurumaa Krishna. “IoT composer: Composition and deployment of IoT applications,” by Salaün, will appear in the Companion Proceedings of the 2019 IEEE/ACM International Conference on Software Engineering (ICSE-Companion). 19–22 in IEEE's 2019 publication.
- Corno, Louise De Russis, and John R. P. Sáenz, “Towards computational notebooks for IoT development,” in Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019, pp. 1–6.
- R. An article by Zhang, W. Xiao, H. Zhang, Y. Liu, H. Lin, and M. “An empirical study on deep learning jobs program failures,” by Yang, to appear in the proceedings of the 42nd IEEE/ACM International Conference on Software Engineering (ICSE) in 2020. pages 1159–1170 in IEEE's 2020 publication.
- The authors (Zhou, J.-G. Lou, H. Zhang, H. Lin, H. Lin, and T. 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, “An Empirical Study on Quality Issues of Production Big Data Platform,” Qin. 2. 2017 IEEE, pages 17–26.
- F. Researchers S. Ocariza, K. Bajaj, K. Pattabiraman, and A. According to Mesbah's research, “A study of causes and consequences of client-side javascript bugs,” published in IEEE Transactions on Software Engineering, volume 2, issue 1, is a good example. 43, no. 2, pp. 128-144, 2016.
- K. Those authors (Chan, Bishop, Steyn, Baresi, and Chan) are M. Presented at the International Conference on Service-Oriented Computing with the title “A fault taxonomy for web service composition,” by Guinea. Pp. 363.–375. Springer, 2007.
- W. We thank X.-B. D. Le, X. Xia, Y. Feng, Z. Chen, and B. Zou for their contributions to this work. Xu, “Smart contract development: Challenges and opportunities,” IEEE Transactions on Software Engineering.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRCSEIT

This work is licensed under a Creative Commons Attribution 4.0 International License.