The Future of Connected Devices

October 20, 2020
Blue abstract background with white hexagonal icons and code overlay.

With the increasing power of digital technology, the vision of a connected manufacturing system that can sense, analyze and respond will soon be a reality. This vision – called “intelligent edge” – combines computing power, data analytics and advanced connectivity to allow responses to be made much closer to where the data is captured. It takes emerging Internet of Things (IoT) and Industry 4.0 capabilities to the next level.

Cybersecurity plays a complex role in this vision. On one hand, technological advances can lead to improved cybersecurity capabilities. On the other hand, when built without a consideration for privacy, data integrity or network resilience, such technological advances can instead increase cyber risks dramatically.

The capabilities that enable the intelligent edge include artificial intelligence (AI), computing hardware, networking capabilities and standard protocols. Advances in these capabilities have converged to help tie together components that accelerate the realization of Industry 4.0. The key components that enable new ways of working, new products and services, and new value creation are:

  • AI already powers a broad array of applications. Cloud-based AI coupled with real-time data processing allows AI to handle high-demand tasks. For example, AI can respond autonomously to process inefficiencies, quality defects and suspected cyberattacks at the edge, with ongoing learning conducted at the core.
  • Computing hardware and firmware are becoming smaller, more rugged and more energy-efficient while increases in processing power enable virtualization, automation and other features customized for a user’s operations and goals. On the edge, data can be captured, encrypted, integrated, processed and stored with ever increasing speed, responsiveness and security.
  • The growth in adoption and deployment of both 5G wireless and Wi-Fi 6 can help drive the secure deployment of increasingly complex systems of connected devices. These advances in wireless technologies can address several current network limitations with:
  • More flexible and scalable deployments.
  • Improved reliability, data capacity, data speeds, latency and density of devices.
  • Support for WPA3 encryption and key management.
  • Precise location sensing of connected devices.
  • Lower power consumption ratios (and in turn reduced size requirements for connected devices).
  • One of the key concepts that allowed the early computer networks to become the internet we now depend on was the adoption of a universal communication protocol that allows networks and devices to communicate regardless of their specific construction. Improved standards and protocols will likewise spur on the growth of the IoT, and in particular Industrial IoT. These standards and protocols include:
  • IO-Link – (IEC 61131-9) defines standard cabling, connectors and a communications protocol for smart sensors and actuators. IO-Link also allows for access to additional information about sensor health and condition.
  • OPC UA – an extension of the OPC interoperability standard that has been used since the mid-1990s for data exchange between operational technology devices. The newer Unified Architecture provides platform-independent communication between devices with added encryption and authentication security while providing future-proof expandability.
  • MQTT – a bi-directional messaging protocol developed to allow for device-to-cloud and cloud-to-device communications. This protocol allows for minimal processor sizes and optimized networks, building in the reliability, security and scalability required for IoT networks.
  • Lightweight Cryptography – emerging standard cryptographic algorithm(s) that can be used to encrypt communication in constrained environments such as with IoT.
  • In light of these and other emerging and advancing technologies, the imagination seems to be the only limit to the breadth and scale of applications for connected devices. Here are a few examples that are poised to take advantage of breakthroughs:
  • Autonomous driving: At the heart of this visionary goal for the automotive industry is the concept of Vehicle-to-Everything (V2X) connectivity. This will leverage universal protocols for communication, advanced real-time processing and high-speed data consumption, with a concerted focus on protecting data integrity and privacy.
  • Wireless Sensing and Location Tracking: Tracking of shipping containers, packages, fleets of vehicles, delivery drones or any other asset can be done in real-time to provide efficiency data as well as prevent thefts, counterfeits and other security risks.
  • Networked Reality: Expanding on the concepts of augmented, virtual and extended reality (AR/VR/XR), connected devices can enable such things as remote maintenance of machines by an offsite technician, visual threat monitoring, and immersive training simulations for new employees.
  • Monitoring and Control of Critical Infrastructure: Intelligent edge computing will enable the broader deployment of smart monitoring devices on critical infrastructure like roads, railways, power lines, smart grids, buildings, bridges and utilities. Smart systems that detect faults, threats, cyberattacks or potential failures can pinpoint vulnerabilities and initiate corrective measures in a predictive and proactive manner.
  • Smart Factories: Smaller, smarter and wireless devices can be deployed on a larger scale in factories and supply chains to provide secure, real-time status of operations on the floor and in the field. Predictive methods, model-based design and digital twin architectures will allow for real-time identification and monitoring of any process or security weaknesses.
  • As we look to the future of edge computing, connected devices and IoT, cybersecurity plays a crucial and integral role. Each technology and each application can succeed or fail based on how cybersecurity is built into the framework. This is sometimes referred to as the Trustworthy Network of Things (TNoT). The goal of the TNoT effort led by NIST in collaboration with industry is to “protect IoT devices from the internet and to protect the internet from IoT devices” by improving the security and robustness of large scale IoT deployments.
  • The decentralized nature of the future – including remote connected devices, intelligent edge gateways, remote servers and distributed users – warrants careful planning and consideration of how data is collected, handled and used. This includes principles of developing a trusted ecosystem of technology partners, security of devices and protocols, and maintaining the integrity and accuracy of data. It also will involve a significant uptick in cybersecurity awareness, education and training to ensure the secure deployment, use, monitoring and maintenance of these new technologies.
  • If you need help with your manufacturing company’s data strategy, have cybersecurity questions or would like to learn more about how connected devices may be in your company’s future, contact us today!

Let’s Get Started!

Contact us today to see if CONNSTEP is a fit for your business.

Related Items


Catalyst Connection has developed Manufacturers’ Guide to Robotics to serve as a tool to help small manufacturers explore the adoption of robotics in their facilities.

Modular equipment that can be easily reconfigured is immensely helpful. Any technology that allows the people who set up and operate equipment to be guided, in order to augment their skillsets, is extremely helpful.

Manufacturers doing business directly or indirectly for the DoD, GSA, and NASA must meet Defense Federal Acquisition Regulation (DFAR) minimum cybersecurity standards or risk losing contacts.

Recent Posts

Penn Globe logo over a room with people, possibly a conference.
February 11, 2026
Learn how Penn Globe partnered with CONNSTEP to invest in employee training, strengthen skills, and support business growth and competitiveness.
Logo of Specialty Cable Corporation (SCC) in a warehouse setting.
February 10, 2026
See how Specialty Cable Manufacturers partnered with CONNSTEP to strengthen quality systems and successfully achieve AS9100 recertification.
People in a factory setting, with the Forum Contract Manufacturing logo in the foreground.
February 9, 2026
Learn how Forum Plastics partnered with CONNSTEP to invest in supervisory training, strengthen leadership skills, and support long-term growth.
Logo of the letter
February 8, 2026
See how a Connecticut printing company partnered with CONNSTEP to improve efficiency, reduce waste, and advance environmental sustainability.
Beekley Medical logo with text
February 7, 2026
Learn how a medical products manufacturer partnered with CONNSTEP to strengthen quality systems and achieve successful recertification.
Pursuit Aerospace logo over a blurred medical equipment background. The logo is white text on a black rectangular box.
February 6, 2026
See how an aerospace manufacturer partnered with CONNSTEP to conduct an internal quality audit and get back on track to compliance.
Woman in lab setting, logo overlay of Syn-Mar Products Inc., blue and white color scheme.
February 5, 2026
Learn how a home bathroom remodeling manufacturer partnered with CONNSTEP to use lean training to streamline operations and improve efficiency.
Logo for Wild CNC Machining Services on a blue background.
February 4, 2026
See how a manufacturer partnered with CONNSTEP to update HR policies, strengthen people practices, and support future business growth.
Modelcraft Co. logo over a blue background featuring a machine shop with machinery.
February 2, 2026
Learn how a manufacturer partnered with CONNSTEP to apply continuous improvement measures that reduced setup and inspection time.
Logo for Siftex,
February 2, 2026
See how a manufacturer partnered with CONNSTEP to elevate supervisory skills, improve performance, and boost overall productivity.
Show More