ArticlePDF Available

IoT-based Enterprise Resource Planning: Challenges, Open Issues, Applications, Architecture, and Future Research Directions

Authors:

Abstract and Figures

In today’s highly competitive markets, organizations can create a competitive advantage through the successful implementation of Enterprise Resource Planning (ERP) systems. ERP works with different technologies, including the Internet of Things (IoT). IoT uses a unique Internet protocol to identify, control, and transfer data to individuals as well as databases. The data is collected through IoT, stored on the cloud, and extracted and managed in through ERP. In this study, we review the challenges, open issues, applications, and architecture of the IoT-based ERP. For this purpose, we review and analyze the latest IoT-related articles to present the unique features of the IoT and discuss its impact on ERP. The results show sensors and devices connected to the Internet can manage the stored data processed in the cloud through ERP without human intervention. We also discuss the challenges and opportunities in the relationship between ERP and the IoT risen by the introduction of the cloud.
Content may be subject to copyright.
A preview of the PDF is not available
... . (Cao and Zhu,2012;Saif et al.,2015;Qiu, 2016;Wang ,2016;Thangiah et al., 2018;Van Niekerk and Rudman,2019;Yilmaz and Hazar,2019;Tavana et al.,2020;Valentinetti and Munoz,2021;Onyshchenko et al., 2022 (ITU,2008;Maistry et al., 2015;Pendley,2018;Kremer et al., 2019;Cui et al., ,2020;Lee,2020;Zadorozhnyi et al., 2020;Lartey et al., 2021 (WatchGuard,2010;Payne , 2018;Cui et al., 2020;Zadorozhnyi et al., 2020;Alghamdie,2021;Busulwa and Evans, 2021 ...
... ‫اع‬ ‫ا‬ ‫يخج‬ ‫اي‬ ‫الخروةا‬ ‫اجا‬ ‫تحا‬ ‫ة‬ ‫اد‬ ‫ا‬ ‫أجه‬ ‫ان‬ ‫ا‬ ‫م‬ ‫ات‬ ‫اار‬ ‫ا‬ ‫ممي‬ ‫اافة‬ ‫ا‬ ‫إض‬ ‫اى‬ ‫ا‬ ‫عم‬ ‫ااعج‬ ‫ا‬ ‫يد‬ ‫اياء‬ ‫ا‬ ‫األش‬ ‫ات‬ ‫ا‬ ‫ن‬ ‫إنتخ‬ ‫اه‬ ‫ا‬ ‫نس‬ ‫أن‬ ‫اى‬ ‫ا‬ ‫إل‬ : ‫أو‬ ‫اخال‬ ‫ا‬ ‫ا‬ ‫األش‬ ‫اهل‬ ‫ا‬ ‫ح‬ ‫اات‬ ‫ا‬ ‫ا‬ ‫السعمهم‬ ‫ان‬ ‫ا‬ ‫م‬ ً ‫اائال‬ ‫ا‬ ‫ا‬ ‫ه‬ ً ‫ا‬ ‫اجر‬ ‫ا‬ ‫ق‬ ‫اه‬ ‫ا‬ ‫ا‬ ‫عش‬ ‫اتج‬ ‫ا‬ ‫يش‬ ‫اا‬ ‫ا‬ ‫ا‬ ‫مس‬ ‫ات،‬ ‫ا‬ ‫ن‬ ‫اإلنتخ‬ ‫اى‬ ‫ا‬ ‫ا‬ ‫إل‬ ‫ة‬ ‫اد‬ ‫ا‬ ‫األجه‬ ‫و‬ ‫اعار‬ ‫ا‬ ‫اإلستذ‬ ‫ا‬ ‫و‬ ‫اجونها‬ ‫ا‬ ‫ا‬ ‫ا‬ ‫ب‬ ‫أو‬ ‫افقتهم‬ ‫اه‬ ‫ا‬ ‫ا‬ ‫ا‬ ‫بس‬ ‫اء‬ ‫اه‬ ‫ا‬ ‫ا‬ ‫ا‬ ‫س‬ ‫اخكات‬ ‫ا‬ ‫ا‬ ‫ا‬ ‫الذ‬ ‫اخكات‬ ‫ا‬ ‫ا‬ ‫ا‬ ‫الذ‬ ‫اى‬ ‫ا‬ ‫ا‬ ‫ا‬ ‫عم‬ ‫اهن‬ ‫ا‬ ‫ا‬ ‫ا‬ ‫السشافد‬ ‫اذ‬ ‫ا‬ ‫ا‬ ‫ا‬ ‫تجد‬ ‫ال‬ ‫ا‬ ‫ا‬ ‫ا‬ ‫مث‬ ‫اتخجامها.‬ ‫ا‬ ‫ا‬ ‫ا‬ ‫إس‬ ‫ااءة‬ ‫ا‬ ‫ا‬ ‫ا‬ ‫س‬ ‫ااج‬ ‫ا‬ ‫االنت‬ ‫اتهيات‬ ‫ا‬ ‫مد‬ ‫أو‬ ‫اافذ‬ ‫ا‬ ‫السش‬ ‫اة‬ ‫ا‬ ‫تكمف‬ ‫ال‬ ‫ا‬ ‫نيك‬ ‫ام‬ ‫ا‬ ‫فه‬ ‫اخض‬ ‫ا‬ ‫بغ‬ ‫اهق؛‬ ‫ا‬ ‫الد‬ ‫اى‬ ‫ا‬ ‫ف‬ ‫ام‬ ‫ا‬ ‫له‬ ‫اة‬ ‫ا‬ ‫السشافد‬(Lee and Lee,2015; Leloglu,2017; Devi and Mohankumar,2019; Payne,2019, Atlam and Wills,2020;Chang et al., 2020; Mahlous and Ara,2020;Khadam et al., 2020; Romansky and Noninska,2020;Tavana et al., 2020; Busulwa and Evans,2021;Martens et al., 2021;Popescu et al., 2021) . ‫ال‬ ‫ا‬ ‫ا‬ ‫لك‬ ‫احها‬ ‫ا‬ ‫ا‬ ‫تشفي‬ ‫ادم‬ ‫ا‬ ‫ا‬ ‫يم‬ ‫اى‬ ‫ا‬ ‫ا‬ ‫الت‬ ‫اخى‬ ‫ا‬ ‫ا‬ ‫األخ‬ ‫اة‬ ‫ا‬ ‫ا‬ ‫األمشي‬ ‫اات‬ ‫ا‬ ‫ا‬ ‫الستطمب‬ ‫ان‬ ‫ا‬ ‫ا‬ ‫م‬ ‫اج‬ ‫ا‬ ‫ا‬ ‫العجي‬ ‫اهد‬ ‫ا‬ ‫ا‬ ‫وج‬ ‫ة‬ ‫اخور‬ ‫ا‬ ‫ا‬ ‫ض‬ ‫ابق‬ ‫ا‬ ‫ا‬ ‫س‬ ‫اا‬ ‫ا‬ ‫ا‬ ‫مس‬ ‫اح‬ ‫ا‬ ‫ا‬ ‫يتز‬ ‫اياء‬ ‫األش‬ ‫ات‬ ‫ن‬ ‫إنتخ‬ ‫اة‬ ‫بشي‬ ‫اتهيات‬ ‫مد‬ ‫ان‬ ‫م‬ ‫اتهى‬ ‫مد‬ (Atlam and Wills ,2020) ‫اا‬ ‫كس‬ . ...
... Currently, ERP software capabilities are widely applied in business organizations. For example, an industrial factory has adopted ERP software to process control [59], bill of materials (BOM), improve operational efficiency [36], inventory management [59], etc. ...
... Currently, ERP software capabilities are widely applied in business organizations. For example, an industrial factory has adopted ERP software to process control [59], bill of materials (BOM), improve operational efficiency [36], inventory management [59], etc. ...
Article
Enterprise Resource Planning (ERP) gives an organization a competitive edge by centralizing organization data and collaborating among supply chain networks. There are many types of software packages available, so most of the research proposed methods for prioritizing the best system. However, they did not suggest how to implement it, or which practices should be employed. So, this paper aims to propose a framework and a method for the selection of an ERP system and the best practice for implementation at the same time. A hybrid method of Logarithmic Fuzzy Preference Programming (LFPP) and Decision-Making Trial and Evaluation Laboratory (DEMATEL) is presented for solving the problem. LFPP is reliable in obtaining weights, while DEMATEL can capture interrelationships between practices. It was applied to a case study supply chain network of a Thai automotive parts manufacturer to demonstrate the applicability; it could establish the priorities of criteria, rank alternatives, and select the appropriate practices at the same time. There is no study about software and practice selection by use of this proposed method before. The comparison of LFPP and the Fuzzy Full Consistency Method (FUCOM-F) was also performed. It shows that FUCOM-F uses a smaller number of pairwise comparisons than LFPP, but the obtained weights of LFPP are more consistent with the evaluation matrix than using FUCOM-F.
... To support such innovative IoT applications and allow large-scale connectivity amongst IoT policies, novel wireless technologies are essential. However, combining the IoT ecosystem with present wireless networks leads to numerous challenges, such as self-organizing operations, coexistence with human-type devices, and limited communication resources [7,10]. Furthermore, IoT tools are usually machine-type tools, differing considerably from usual human-kind devices, such as smartphones, in terms of computation, memory, energy constraints, and traffic patterns [11]. ...
... The major problem with these relay nodes relies on the fact that they operate with limited battery life and therefore depend upon some external technique to acquire energy and satisfy their energy demands in order to maintain their operation within the wireless network [8]. CoR networks along with SWIPT provide a huge number of benefits for energy-constrained wireless devices together with an enhanced QoS [9][10][11]. ...
Article
In this paper, a Simultaneous Wireless Information and Power Transfer (SWIPT) aided Cooperative Relaying (CoR) scheme is employed to perform energy harvesting and information transmission at the same time for a low-powered Internet of Things (IoT) network. A decode and forward power splitting relaying (DF-PSR) protocol is utilized, and performance analysis is made by considering two scenarios, namely (i) Energy Harvesting (EH) relay and non-EH IoT device, and (ii) EH relay and EH-IoT device. Analytical models for computing Average Symbol Error Probability (ASEP) based on an Optimal Power Splitting Scheme (OPSS) for Scenario-1 and Joint Optimal Power Splitting Scheme (JOPSS) for Scenario-2 are presented by considering the effects of relay location. Moreover, an Adaptive Power Splitting Scheme (APSS) is suggested based on instantaneous Symbol Error Probability (SEP) under instantaneous channel conditions. The analytical results are validated through Monte Carlo simulations. The simulation results show that APSS performs better as compared to OPSS under given conditions.
... Online Shop Payment [12] [13], saat banyak perusahaan sudah memanfaatkan marketplace sebagai pasar digital dalam melakukan pemasaran. Tentunya hal ini sangat menguntungkan, karena biaya sales dapat ditekan, tetapi dialihkan ke sales online [14], sehingga dari segi biaya pengemasan dan pengiriman barang dapat diketahui langsung ke Management. Sehingga Management dapat menggunakan data pengiriman barang olahan yang terserap oleh pasar untuk dilakukan analisa lebih lanjut. ...
Full-text available
Article
p> Companies do not just build information technology carelessly and buy information technology equipment without considering aspects of company needs. In planning information technology and systems, it is necessary to conduct a survey and analysis of user needs. So that the results of the survey and analysis become a guide in planning user needs so that the development of technology and information systems can support the company's operations, making it more efficient in running the company. The core of the problem of implementing Enterprise Architecture is to build corporate IT by implementing an Enterprise Architecture based on TOGAF ADM. The purpose of this research is to implement Enterprise Architecture aimed at making IT Planning on the Enterprise Resource Planning application system, in order to be more effective in implementing the application. The roadmap becomes clearer with the Enterprise Architecture. After doing Enterprise Architecture there is a Migration Planning stage, which is used for application to the Enterprise Resource Planning (ERP) application system. The implementation of the ERP system implementation will be carried out in stages using a timeline. Keywords: Enterprise Resource Planning; Enterprise Architecture; TOGAF-ADM; Bamboo processing manufacturing; Information Technology Abstrak. Perusahaan tidak hanya membangun teknologi informasi secara sembarangan dan membeli peralatan informasi teknologi tanpa mempertimbangkan aspek kebutuhan perusahaan. Dalam merencanakan teknologi dan sistem informasi perlu dilakukan survey dan analisa tentang kebutuhan user . Sehingga hasil survey dan analisa menjadi panduan dalam merencanakan kebutuhan user sehingga pembangunan teknologi dan sistem informasi dapat mendukung operasional perusahaan, sehingga lebih efisien dalam menjalankan perusahaan. Inti dari masalah penerapan Enterprise Architecture , membangun IT Perusahaan dengan menerapkan Enterprise Architecture berbasis TOGAF ADM. Tujuan penelitian ini adalah melakukan penerapan Enterprise Architecture bertujuan untuk pembuatan IT Planning pada sistem aplikasi Enterprise Resource Planning , supaya menjadi lebih efektif dalam melaksanakan penerapan. Roadmap menjadi lebih jelas dengan adanya Enterprise Architecture . Setelah melakukan Enterprise Architecture ada tahapan Migration Planning, yang digunakan untuk penerapan pada sistem aplikasi Enterprise Resource Planning (ERP). Pelaksanaan dari penerapan sistem ERP akan dilakukan secara bertahap menggunakan timeline . Kata kunci : Enterprise Resource Planning; Enterprise Architecture; TOGAF ADM; Manufaktur pengolahan bambu; Teknologi Informasi; </p
... 3) accounting digitalization. (Tavana et al., 2020). These resource planning systems have been in place since the 1990s to have uniform information systems and redesign business processes (Palaniswamy, 2002). ...
Article
Purpose: Nowadays, we talk about an increasing number of tools in the IT area that are being used in the accounting field. We can already discuss automation, robotics, artificial intelligence, and digitalization in accounting practices. This reality is giving rise to more and more discussions about how the era of digitalization of processes influences or will influence the activity carried out by accountants. In this context, our study aims to establish to what extent this new reality in the practice of economic entities is advantageous for professionals in the field or, on the contrary, is a threat from the perspective of taking over tasks, operations or activities that accountants currently still have in their portfolio.Methodology: Therefore, using scientific research tools, we will try to clarify whether the accounting profession and professionals are threatened by the developments observed due to the increasing advances that are taking place in digitalization. The research undertaken is based on the analysis of speciality literature, the regulatory framework applicable to accounting in Romania, and the accounting officer based on International Financial Reporting Standards.Results and Findings: The study aims to identify the advantages and threats that digitalization induces in the field of accounting practice and the major paradigm shifts that digitalization will bring to the exercise of the profession by accountants. The study will also look at the limitations that digitalization has in the field of accounting and the significant changes that digitalization will impose on the education and training of professionals in the field of accounting.
Article
The Internet of Things (IoT) revolutionizes the technology landscape by enabling a wide spectrum of services and applications, characterized by a large number of devices, communication protocols, and data formats. Seamless integration among various IoT-enabled technologies is the most challenging task as the technical standards are disjoint. This often results in monolithic structures with very poor scalability. Further, data heterogeneity in IoT networks increases the measure of multidimensionality, which poses a critical challenge of sharing data with other business applications. Therefore, IoT-based solution requires an architectural framework supported by a large number of independent and specialized microservices towards providing sufficient scalability and interoperability. In this manuscript, a layered architectural framework is proposed where a novel device template concept is introduced to enable flexible and interoperable integration of microservices with IoT devices. The proposed model is formally validated using Event-B in the Rodin platform with the help of proof obligations. Again, a service aggregation algorithm is proposed to reduce the latency and increase the reuse of microservices. Further, the proposed architectural framework is implemented and compared with other similar frameworks. The experimental result shows that the proposed architectural framework enables enhanced interoperability, scalability, and reusability of IoT devices and microservices.
Article
The Industry 4.0 revolution is changing the manufacturing landscape. A broad set of new technologies emerged (including software and connected equipment) that digitise manufacturing systems. These technologies bring new vitality and opportunities to the manufacturing industry, but they also bring new challenges. This paper focuses on the impact of Industry 4.0 on production planning approaches and software. We first propose a digital twin framework that integrates production planning systems and frontier technologies. The frontier technologies that may impact production planning software are the internet of things, cloud manufacturing, blockchain, and big data analytics. Second, we provide a state-of-the-art on the application of each technology in the production planning, as well as a detailed analysis of the benefit and application status. Finally, this paper discusses the future research and application directions in the production planning. We conclude that Industry 4.0 will lead to the construction of data-driven models for production planning software. These tools will include models built accurately from data, account for uncertainty, and partially actuate the decision autonomously.
Chapter
In order to meet the challenge of industry in economic globalization, enterprises around world have built information systems to effectively manage the production, achieve integration of suppliers and customer and organize all the resources by software. However, the interaction between the system and users are not always intuitive and some of the questions about production cannot easily to be answered in today’s Enterprise Resource Planning (ERP). This paper aims at proposing a vocal natural language interface which adopts text-to-SQL neural networks for an open source ERP system Odoo for purpose of interacting with the complex ERP system easily by voice. The current automatic speech recognition can transform voice into text with reliability. For the next step of text-to-SQL, although there is no large amount of data of natural-language-query and SQL pairs in production, the neural text-to-SQL parser can be trained on less specific databases and data and worked on specific closed domain databases like ERP. Moreover, this cross-domain feature of neural text-to-SQL parser makes it possible to build such an interface. The result showed that such an interface can be applied on actual usage scenario and informs the user of the manufacturing status. The proposed system is now implemented on command line and a graphic interface will make it more intuitive.KeywordsNatural language processing (NLP)Enterprise resource planning (ERP)Text-to-SQL parser
Full-text available
Article
The level of global GHGs (Green House Gasses) production has increased dramatically over the past 20 years. To meet new targets for global GHG levels, it is key to monitor and model the effects of land use on GHG production. Peatland areas play a significant role in GHG modeling. Recent research in the area has been working to provide solutions to better monitor the environment through the provision of real-time data streams on key drivers of the environment. The Internet of things (IoT) technologies has found application in peatland monitoring as it provides useful tools to better monitor the environment. Current IoT systems, however, are too expensive to be deployed on a scale that would allow for refined monitoring of the biodiverse region. Also, deployment of IoT sensing devices requires expertise and specialized equipment resulting in prohibitive costs for many sites. Furthermore, there is no formalized architecture in existence for the application of ecological surveying and no complete system have been developed for data handling and analysis. This paper therefore aims to detail a system that enables cost-effective collection, curation and processing of data in peatland areas, however, the system can be generalized for any environmental monitoring case.
Full-text available
Article
Data and object connectivity are the key and the critical component of industry 4.0, Connectivity of software, equipment, data ... are all massive data to be processed. Combined with cybersecurity, they become fundamental elements for creating intelligence in an industrial system that can increase the flexibility of production in addition to allocating resources more efficiently. In order to successfully transition to ecosystem 4.0, the industry must examine the new skills that are required and the need for qualified personnel. The fourth industrial revolution corresponds to the widespread use of sensors and intelligent agents to connect machines, components, processes and operators. This is generally called the digital factory or industry 4.0. It suggests a global system of effective communication between the modules of decision-making. World 4.0 will allow interaction between products, machines and even between machines (M2M). The product will also be able to communicate with machines in the production phase. This is called intelligent production, which will allow the modification and customization of products in their production phase. In this article, we present a communication model based on Modbus and multiband communication using NB-IOT, this communication model allows data to be exchanged between different industrial equipment (PLCs, SCADA systems, etc.) via MODBUS RTU and ASCII, via RS485, or via analog and digital inputs for sensors and actuators.
Full-text available
Article
Pervasive IoT applications enable us to perceive, analyze, control, and optimize the traditional physical systems. Recently, security breaches in many IoT applications have indicated that IoT applications may put the physical systems at risk. Severe resource constraints and insufficient security design are two major causes of many security problems in IoT applications. As an extension of the cloud, the emerging edge computing with rich resources provides us a new venue to design and deploy novel security solutions for IoT applications. Although there are some research efforts in this area, edge-based security designs for IoT applications are still in its infancy. This paper aims to present a comprehensive survey of existing IoT security solutions at the edge layer as well as to inspire more edge-based IoT security designs. We first present an edge-centric IoT architecture. Then, we extensively review the edge-based IoT security research efforts in the context of security architecture designs, firewalls, intrusion detection systems, authentication and authorization protocols, and privacy-preserving mechanisms. Finally, we propose our insight of future research directions and open research issues.
Full-text available
Article
Increasing diverse consumer demands, rapid advancements in digital technology and increasing internet access is shifting the market trend to smart, connected and customized Internet of Things (IoT) products. This forces industries to design, develop and mass produce affordable smart customized products to stay ahead of the competition. Early in the product development stage the complete product lifecycle needs to be taken into account. Here, concepts such as systems engineering, mass customization, flexible production planning and smart manufacturing with customer integration, can address new challenges and change the way products are being handled within their life cycles. The motivation of this paper is to present a systematic product development methodology for developing customizable IoT devices, which involve more processes than a mass-produced mechatronic product. Concepts such as variant management and smart service management come into picture to enable an efficient customizable smart product development. Numerous product development methodologies already exist. Therefore, in this paper, a methodology is detailed by identifying, combining and/or enhancing existing product development methodologies to assist in systematically developing smart customizable IoT.
Article
Internet of Things (IoT), a ubiquitous network of interconnected objects, harvests information from the environments, interacts with the physical world, and uses the existing Internet infrastructure to provide services for information transfer and emerging applications. However, the scalability and Internet access fundamentally challenge the realization of a wide range of IoT applications. Based on recent developments of 5G system architecture, namely SoftAir, this paper introduces a new software-defined platform that enables dynamic and flexible infrastructure for 5G IoT communication. A corresponding sum-rate analysis is also carried out via an optimization approach for efficient data transmissions. First, the SoftAir decouples control plane and data plane for a software-defined wireless architecture and enables effective coordination among remote radio heads (RRHs), equipped with millimeter-wave (mmWave) frontend, for IoT access. Next, by introducing an innovative design of software-defined gateways (SD-GWs) as local IoT controllers in SoftAir, the wide diversity of IoT applications and the heterogeneity of IoT devices are easily accommodated. These SD-GWs aggregate the traffic from heterogeneous IoT devices and perform protocol conversions between IoT networks and radio access networks. Moreover, a cross-domain optimization framework is proposed in this extended SoftAir architecture concerning both upstream and downstream communication, where the respective sum-rates are maximized and system-level constraints are guaranteed, including (i) quality-of-service requirements of IoT transmissions, (ii) total power limit of mmWave RRHs, and (iii) fronthaul network capacities. Simulation results validate the efficacy of our solutions, where the extended SoftAir solution surpasses existing IoT schemes in spectral efficiency and achieves optimal data rates for next-generation IoT communication.
Article
The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. IoT is one of the fastest developing fields in the history of computing, with an estimated 50 billion devices by the end of 2020. However, the crosscutting nature of IoT systems and the multidisciplinary components involved in the deployment of such systems have introduced new security challenges. Implementing security measures, such as encryption, authentication, access control, network and application security for IoT devices and their inherent vulnerabilities is ineffective. Therefore, existing security methods should be enhanced to effectively secure the IoT ecosystem. Machine learning and deep learning (ML/DL) have advanced considerably over the last few years, and machine intelligence has transitioned from laboratory novelty to practical machinery in several important applications. Consequently, ML/DL methods are important in transforming the security of IoT systems from merely facilitating secure communication between devices to security-based intelligence systems. The goal of this work is to provide a comprehensive survey of ML methods and recent advances in DL methods that can be used to develop enhanced security methods for IoT systems. IoT security threats that are related to inherent or newly introduced threats are presented, and various potential IoT system attack surfaces and the possible threats related to each surface are discussed. We then thoroughly review ML/DL methods for IoT security and present the opportunities, advantages and shortcomings of each method. We discuss the opportunities and challenges involved in applying ML/DL to IoT security. These opportunities and challenges can serve as potential future research directions.
Article
As Internet-of-Things (IoT) networks provide efficient ways to transfer data, they are used widely in data sensing applications. These applications can further include wireless sensor networks. One of the critical problems in sensor-equipped IoT networks is to design energy efficient data aggregation algorithms that address the issues of maximum value and distinct set query. In this paper, we propose an algorithm based on uniform sampling and Bernoulli sampling to address these issues. We have provided logical proofs to show that the proposed algorithms return accurate results with a given probability. Simulation results show that these algorithms have high performance compared with a simple distributed algorithm in terms of energy consumption.
Article
The Internet of Things (IoT) is a fast growing and rapidly evolving field. Everyday objects from smart home appliances (e.g. toasters and refrigerators) to health monitoring products (e.g. pacemakers and blood pressure monitors), to minuscule sensors and actuators, are being redesigned to be able to transfer data over a network. The connection of billions of these new objects to the Internet will cause a dramatic increase in the amount of shared data, which will simultaneously introduce a plethora of security risks. Understanding how to secure the data being sent over IoT links is necessary for the IoT paradigm to succeed. A popular data transfer protocol connecting IoT devices is the Constrained Application Protocol (CoAP). We used an open-source implementation of CoAP along with Datagram Transport Layer Security (DTLS) to implement secure data transfer between IoT devices. We studied the impact of DTLS on CoAP in the real IoT testbed we have developed using resource-constrained IoT devices and open-source software. Our tests showed that utilizing a CoAP-DTLS implementation with a symmetric key cipher suite resulted in noticeable performance costs. A secure connection with DTLS over CoAP used approximately 10% more energy than an unsecure connection. In addition, our latency tests revealed over a 100% increase in average latency time for secure messages compared to when no encryption is used. We also highlight some of the implementation challenges encountered while developing a real IoT testbed for secure experimentation.