LPWANs
IEEE/SCU SoE Virtual Event: May 26, 2022- Critical Cybersecurity Issues for Cellular Networks (3G/4G, 5G), IoT, and Cloud Resident Data Centers
This virtual event on ZOOM will be from 10am-12pm PDT on May 26, 2022.
Session Abstract:
IEEE ComSoc and SCU School of Engineering (SoE) are thrilled to have three world class experts discuss the cybersecurity threats, mitigation methods and lessons learned from a data center attack. One speaker will also propose a new IT Security Architecture where control flips from the network core to the edge.
Each participant will provide a 15 to 20 minute talk which will be followed by a lively panel session with both pre-planned and ad hoc/ extemporaneous questions. Audience members are encouraged to submit their questions in the chat and also to send them in advance to [email protected].
Below are descriptions of each talk along with the speaker’s bio:
Cybersecurity for Cellular Networks (3G/4G, 5G NSA and SA) and the IoT
Jimmy Jones, ZARIOT
Abstract:
Everyone agrees there is an urgent need for improved security in today’s cellular networks (3G/4G, 5G) and the Internet of Things (IoT). Jimmy will discuss the legacy problems of 3G/4G, migration to 5G and issues in roaming between cellular carriers as well as the impact of networks transitioning to support IoT.
Note: It’s important to know that 5G security, as specified by 3GPP (there are no ITU recommendations on 5G security), requires a 5G Stand Alone (SA) core network, very few of which have been deployed. 5G Non Stand Alone (NSA) networks are the norm, but they depend on a 4G-LTE infrastructure, including 4G security.
Cellular network security naturally leads into IoT security, since cellular networks (e.g. NB IoT, LTE-M, 5G) are often used for IoT connectivity.
It is estimated that by 2025 we will interact with an IoT device every 18 seconds, meaning our online experiences and physical lives will become indistinguishable. With this in mind it is as critical to improve IoT security as fastening a child’s seatbelt.
The real cost of a security breach or loss of service for a critical IoT device could be disastrous for a business of any size, yet it’s a cost seldom accurately calculated or forecasted by most enterprises at any stage of IoT deployment. Gartner predicts Operational Technologies might be weaponized to cause physical harm or even kill within three years.
Jimmy will stress the importance of secure connectivity, but also explain the need to protect the full DNA of IoT (Device, Network and Applications) to truly secure the entire system.
Connectivity providers are a core component of IoT and have a responsibility to become part of the solution. A secure connectivity solution is essential, with strong cellular network standards/specifications and licensed spectrum the obvious starting point.
With cellular LPWANs (Low Power Wide Area Networks) outpacing unlicensed spectrum options (e.g. LoRa WAN, Sigfox) for the first time, Jimmy will stress the importance of secure connectivity and active collaboration across the entire IoT ecosystem. The premise is that the enterprise must know and protect its IoT DNA (Device, Network & Application) to truly be secure.
Questions from the audience:
I am open to try and answer anything you are interested in. Your questions will surely push me, so if you can let me know in advance (via email to Alan) that would be great! It’s nice to be challenged a bit and have to think about something new.
One item of interest might be new specific IoT legislation that could protect devices and data in Europe, Asia, and the US ?
End Quote:
“For IoT to realize its potential it must secure and reliable making connectivity and secure by design policies the foundation of and successful project. Success in digital transformation (especially where mission and business critical devices are concerned) requires not only optimal connectivity and maximal uptime, but also a secure channel and protection against all manner of cybersecurity threats. I’m excited to be part of the team bringing these two crucial pillars of IoT to enterprise. I hope we can demonstrate that security is an opportunity for business – not a burden.”
Biography:
Jimmy Jones is a telecoms cybersecurity expert and Head of Security at ZARIOT. His experience in telecoms spans over twenty years, during which time he has built a thorough understanding of the industry working in diverse roles but all building from early engineering positions within major operators, such as WorldCom (now Verizon), and vendors including Nortel, Genband & Positive Technologies.
In 2005 Jimmy started to focus on telecom security, eventually transitioning completely in 2017 to work for a specialist cyber security vendor. He regularly presents at global telecom and IoT events, is often quoted by the tech media, and now brings all his industry experience to deliver agile and secure digital transformation with ZARIOT.
…………………………………………………………………………………………………………………………………………………………………………………………………………………….
Title: Flip the Security Control of the Internet
Colin Constable, The @ Company
The PROBLEM:
With the explosion of Internet connected devices and services carrying user data, do current IT architectures remain secure as they scale? The simple and scary answer is absolutely no, we need to rethink the whole stack. Data breaches are not acceptable and those who experience them pay a steep price.
Transport Layer Security (TLS) encrypts data sent over the Internet to ensure that eavesdroppers and hackers are unable to see the actual data being transmitted. However, the Router needs meta data (the IP and Port) to make it work. What meta data does the Data level Router have access to?
We need to discuss how to approach the problem and selectively discard, but learn from previous IT architectures so that we can build a more solid, secure IT infrastructure for the future.
Proposition:
I will provide a glimpse of a future security focused IT architecture.
- We need to move most security control functionality to the edge of the network.
- Cloud data center storage should be positioned as an encrypted cache with encryption keys at the edge.
- No one set of keys or system admin can open all the encrypted data.
When data is shared edge to edge we need to be able to specify and authenticate the person, entity or thing that is sharing the data. No one in the middle should be able to see data in the clear.
Issues with Encryption Keys:
- IT and Data security increasingly rely on encryption; encryption relies on keys; who has them?
- Is there really any point to VPN’s Firewalls and Network segmentation if data is encrypted?
- We use keys for so many things TLS, SSH, IM, Email, but we never tend to think about the keys.
- Do you own your keys? If not someone else can see your data!
- What do we need to flip the way IT is architected?
Recommendations for Keys:
- Keys should be cut at the edge and never go anywhere else.
- You should be able to securely share keys along with the data being transmitted/received.
- There needs to be a new way to think about identity on the Internet.
The above description should stimulate many questions from attendees during the panel discussion.
Biography:
Colin Constable’s passion is networking and security. He was one of the founding members of the Jericho Forum in the 2000s. In 2007 at Credit Suisse, he published “Network Vision 2020,” which was seen by some as somewhat crazy at the time, but most of it is very relevant now. While at Juniper, Colin worked on network virtualization and modeling that blurred the boundaries between network and compute. Colin is now the CTO of The @ Company, which has invented a new Internet protocol and built a platform that they believe will change not just networking and security, but society itself for the better.
……………………………………………………………………………………………………………………….
The Anatomy of a Cloud Data Center Attack
Thomas Foerster, Nokia
Abstract:
Critical infrastructure (like a telecommunications network) is becoming more complex and reliant on networks of inter-connected devices. With the advent of 5G mobile networks, security threat vectors will expand. In particular, the exposure of new connected industries (Industry 4.0) and critical services (connected vehicular, smart cities etc.) widens the cybersecurity attack surface.
The telecommunication network is one of the targets of cyber-attacks against critical infrastructure, but it is not the only one. Transport, public sector services, energy sector and critical manufacturing industries are also vulnerable.
Cloud data centers provide the required computing resources, thus forming the backbone of a telecommunications network and becoming more important than ever. We will discuss the anatomy of a recent cybersecurity attack at a cloud data center, review what happened and the lessons learned.
Questions:
- What are possible mitigation’s against social engineering cyber- attacks?
-Multifactor authentication (MFA)
-Education, awareness and training campaigns
- How to build trust using Operational Technology (OT) in a cloud data center?
Examples:
- Access monitoring
- Audits to international standards and benchmarks
- Security monitoring
- Playbooks with mitigation and response actions
- Business continuity planning and testing
Recommendations to prevent or mitigate DC attacks:
- Privileged Access Management across DC entities
- Individual credentials for all user / device entities
- MFA: One-Time Password (OTP) via text message or phone call considered being not secure 2-Factor Authentication anymore
- Network and configuration audits considering NIST/ CIS/ GSMA NESAS
- Regular vulnerability scans and keep network entities up to date
- Tested playbooks to mitigate security emergencies
- Business continuity planning and establish tested procedures
Biography:
Thomas Foerster is a senior product manager for Cybersecurity at Nokia. He has more than 25 years experiences in the telecommunications industry, has held various management positions within engineering and loves driving innovations. Thomas has dedicated his professional work for many years in product security and cybersecurity solutions.
Thomas holds a Master of Telecommunications Engineering from Beuth University of Applied Sciences, Berlin/ Germany.
……………………………………………………………………………………………………………………………………………………………………………………………………………………………..
Video recording of this event: Critical Cybersecurity Issues for Cellular Networks, IoT, and Cloud-Resident Data Centers – YouTube
Previous IEEE ComSoc/SCU SoE March 22, 2022 event: OpenRAN and Private 5G – New Opportunities and Challenges
Video recording: https://www.youtube.com/watch?v=i7QUyhjxpzE
Highlights of IDTechEx: IoT Connectivity Sessions and Exhibits: November 15-16, 2017
Introduction:
The Internet of Things (IoT) will connect existing systems and then augment those by connecting more things, thanks to wireless sensor networks and other technologies. Things on the ‘edge’ form mesh networks and can make their own automated decisions. This article reviews key messages from conference technical sessions on IoT connectivity and describes a new Wireless Mesh Sensor network which is an extension of IEEE 802.15.4.
Sessions Attended:
1. Overcoming Adoption Barriers To Achieve Mass IIoT Deployment, Iotium
Early adopters are realizing the complexities involved in scalable mass deployment of Industrial IoT. These includes deployment complexities, security issues starting from hardware root of trust to OS, network, cloud security and application vulnerabilities, and extensibility. This session will focus on these 3 areas in-depth to help you successfully deploy your own IIoT strategy.
2. Overcoming The Connectivity Challenge Limiting IoT Innovation, Helium
The hardware and application layers of IoT systems are supported by robust, mature markets, with devices tailored for any use case and pre-built infrastructure platforms from Microsoft, Google and AWS. But the connectivity layer, without which the entire system is useless, still has numerous challenges. It takes too much knowledge and time to get data from sensors to apps that most staffs don’t have. The speaker discussed a streamlined, secure approach to connectivity that will make building a wireless IoT network as easy as designing a mobile app, thereby removing the greatest barrier to mass IoT adoption.
3. Whitelabel The Future: How White Label Platforms Will Streamline The IoT Revolution, Pod Group
As expectations tend towards personalized, data-driven services, responding immediately to market changes is becoming a key differentiator, creating the need for mutual insight on both sides of the market. Whitelabelled platforms are an effective intermediary, allowing unprecedented levels of customer interaction and paving the way for truly end-to-end IoT systems.
Barriers to achieving a sustainable IoT business model:
-Businesses must have flexible resources and structures:
a] lacking tools to implement (new technology/billing)
b] organizational changes (retraining staff/expertise at top level)
-55% of large enterprises are not pursuing IoT (Analysys Mason)
-Digital proficiency lacking in 50% of companies (Price Waterhouse Cooper)
-IoT platforms can introduce users to systems as a whole & streamline management
There are several different types of IoT platforms:
-IoT Application Enablement Platform – in-field application (eg. device) management
-Connectivity Management Platform (CMP) – management of network connections
-Back-end Infrastructure as a Service (IaaS) – hosting space and processing power
-Hardware-specific Platform – only works with one type of hardware
Many platforms tied to specific provider/device:
– ‘Agnostic’ platforms ideal to integrate different types & retain adaptability (eg. connectivity management integrating device mgmt. & billing capabilities).
-CMPs offer a range of services: managing global connections, introducing providers to clients, integration with hardware vendors, etc.
-CMPs focus on centralized network management- not on building new services.
-Application Enablement Platforms focus on device management/insight–billing hierarchy enables new business services with additional layers, e.g. analytics.
What will the IoT landscape look like in the near future?
-Various connectivity technologies competing, platform technology and open-source driving software/service innovation.
-Hybrid platform offers ease of management, solid foundation for building recurring revenue from value-added services – ensures business is scalable and able to roll-out services quickly.
-Capable platform shifts focus from day-to-day management to building new bus. models and recurring rev. streams..
-Whitelabel platforms help to implement new business models throughout business, consolidate management of legacy and future systems, and build recurring revenue from end-to-end value-added services.
Choose right platform for your business – ease-of-use, billing hierarchies, multi-tech integration key to generating recurring revenue.
With a strong platform in place to future-proof devices and manage customer accounts and business, enterprise can be part of full IoT ecosystem, gaining value from every stage.
4. From Disappointing To Delightful: How To build With IoT, Orange IoT Studio
Many engineers, designers and business folks want to work with IoT devices, but don’t know where to begin. Come learn which mistakes to avoid and which best practices to copy as you integrate with IoT or build your own IoT products. This presentation examines the consistent, systematic ways that IoT tends to fail and delight. The talk explained what makes IoT unique, and examined why it’s not at all easy to classify IoT platforms and devices.
5. Many Faces Of LPWAN (emphasizing LoRaWAN), Multi-Tech Systems
Until recently, most M2M and Internet of Things (IoT) applications have relied on high-speed cellular and wired networks for their wide area connectivity. Today, there are a number of IoT applications that will continue to require higher-bandwidth, however others may be better suited for low-power wide-area network options that not only compliment traditional cellular networks, but also unlock new market potential by reducing costs and increasing the flexibility of solution deployments.
Low-Power Wide-Area Networks (LPWAN)s are designed to allow long range communications at low bit rates. LPWANs are ideally suited to connected objects such as sensors and “things” operating on battery power and communicating at low bit rates, which distinguishes them from the wireless WANs used for IT functions (such as Internet access).
Many LPWAN alternative specifications/standards have emerged – some use licensed spectrum such as ITU-R LTE Cat-M1 and 3GPP NB-IoT, while other alternatives such as LoRaWAN™ are based on as specification from the LoRA Alliance and uses unlicensed industrial, scientific, and medical (ISM) radio band/spectrum.
IoT has many challenges – from choosing the right device, to adding connectivity and then managing those devices and the data they generate. Here are just a few IoT connectivity challenges:
- Long battery life (5+ yrs) requires low power WAN interface
- Low cost communications (much lower than cellular data plans)
- Range and in-building penetration
- Operation in outdoor and harsh environments
- Low cost infrastructure
- Robust communications
- Permits mobility
- Scalable to thousands of nodes/devices
- Low touch management and provisioning – Easy to attach assets
- Highly fragmented connectivity due to a proliferation of choices
Mike Finegan of Multi-Tech presented several LPWAN use case studies, including tank monitoring in Mt. Oso, CA; point of sales terminals, kiosks, vending machines; oil and gas; distributed energy resources; agriculture; and a real time control school traffic sign (T-Mobile using NB-IoT equipment from MultiTech (the first public NB-IoT demo in North America).
Mr. Finegan concluded by emphasizing the importance of security functions needed in an IoT Connectivity Platform. A “trusted IoT platform” should reduce attack vectors, provide secure and reliable end to end communications, and device to headquarters management services.
6. What Makes a City Smart? Totem Power
The framework necessary to build holistic infrastructure that leverages capabilities essential to realizing the full potential of smart cities – concepts including curbside computing power, advanced energy resiliency and ubiquitous connectivity.
An interesting observation was that fiber trenches being dug to facilitate 5G backhaul for small cells and macro cells could accommodate electrical wiring for power distribution and charging of electric vehicles within the city limits.
………………………………………………………………………………………………
At it’s booth, Analog Devices/ Linear Technology displayed an exhibit of SmartMesh® – a Wireless Mesh Sensor Network that was based on a now proprietary extension of IEEE 802.15.4 [1]. SmartMesh® wireless sensor networking products are chips and pre-certified PCB modules complete with mesh networking software; enabling sensors to communicate in tough Industrial Internet of Things (IoT) environments.
Note 1. IEEE 802.15.4 is a standard which defines the operation of low-rate wireless personal area networks (LR-WPANs) via PHY and MAC layers. It focuses on low-cost, low-speed ubiquitous communication between devices.
……………………………………………………………………………………………………….
The Industrial Internet of Things (IoT) wireless sensor networks (WSNs) must support a large number of nodes while meeting stringent communications requirements in rugged industrial environments. Such networks must operate reliably more than ten years without intervention and be scalable to enable business growth and increasing data traffic over the lifetime of the network.
More information on SmartMesh® is here.
……………………………………………………………………………………………….
References:
https://www.idtechex.com/internet-of-things-usa/show/en/
https://www.idtechex.com/internet-of-things-usa/show/en/agenda
http://www.linear.com/dust_networks/
LoRaWAN and Sigfox lead LPWANs; Interoperability via Compression
Backgrounder:
The Low Power Wide Area Network (LPWAN) market is focused on IoT WAN connectivity for devices (endpoints) that consume low power, send/receive short messages at low speeds, and have low duty cycles. There are two categories of LPWANs:
1] Cellular (e.g. NB-IoT and LTE Category M1) WANs using licensed spectrum.
2] Wireless WANs operating in unlicensed frequency bands.
While cellular may be the ultimate winner, Sigfox and LoRAWAN currently have a lot more market traction and are growing very fast. Other non-cellular LPWANs (Ingenu, Weightless SIG, etc.) are also getting some attention, but if there are too many commercially available LPWANs the market will be segmented and fractured.
Overview of LoRaWAN and Sigfox network:
Let’s look at the two most popular unlicensed band LPWANs:
1. LoRaWAN:
- LoRaWAN is specified by the LoRa Alliance which includes 47 network operators.
- The LoRa Alliance states on its website: “LoRaWAN™ is the open global standard for secure, carrier-grade IoT LPWA connectivity. With a certification program to guarantee interoperability and the technical flexibility to address the multiple IoT applications be they static or mobile we believe that LoRaWAN can give all THINGS a global voice.”
- For the Physical layer (PHY), LoRa uses a modulation scheme called chirp spread spectrum (CSS) and a radio both developed and sold or licensed by Semtech Corporation.
- About two years ago, Semtech licensed its technology to Microchip and NXP (like ARM, Semtech now licenses to other semiconductor companies). As a result, the core LoRa hardware (PHY layer) is no longer provided by a single global chip manufacturer.
- LoRaWAN defines the media access control (MAC) sublayer of the Data Link layer, which is maintained by the LoRa Alliance. This distinction between LoRa and LoRaWAN is important because other companies (such as Link Labs) use a proprietary MAC sublayer on top of a LoRa chip to create a better performing, hybrid design (called Symphony Link by Link Labs).
- Many of the LoRa Alliance companies building products are focusing on software defined enhancement and use the LoRaWAN defined MAC.
- LoRaWAN will most likely be best used for “discrete” applications like smart buildings or campuses, where mobile network connectivity is not needed.
……………………………………………………………………………………………………………………….
2. Sigfox:
- Sigfox has designed its technology and network to meet the requirements of mass IoT applications; long device battery life-cycle, low device cost, low connectivity fee, high network capacity, and long range.
- Sigfox has the lowest cost radio modules(<$3, compared to ~$10 for LoRa, and $12 for NB-IoT).
- A recent announcement from Sigfox noted the addition of a new service called “Admiral Ivory,” that makes possible to connect devices with hardware components costing as little as $0.20.
- An overview of Sigfox’s network technology is described here. It consists of: Ultra Narrow Band radio modulation, a light weight protocol, small frame size/payload, and a star network architecture.
- The Sigfox network is currently deployed in 36 countries, 17 of which already have national coverage.
- In February, Sigfox reached an agreement with mobile network operator Telefonica to integrate Sigfox’s low-powered connectivity into the Telefonica’s managed connectivity platform. By complementing Telefónica’s cellular connectivity offerings, with Sigfox’s LPWAN connectivity solution, customers can choose the most appropriate type of connectivity or combine them, implementing use cases and creating new service opportunities that otherwise may not have been possible.
- Additionally, Telefónica´s managed connectivity platform will integrate Sigfox’s cloud, which gives the company the ability to develop its own end-to-end IoT solutions, based on Sigfox’s connectivity solution and including device integration, as well as data collection and management.
- While Sigfox is a proprietary IoT network architecture, the company has provided their intellectual property library free of charge and royalty-free to semiconductor companies which have implemented chipsets with dedicated Sigfox interfaces or multi-mode capabilities. The list of chipsets/modules supporting Sigfox (+ multimode) includes: Pycom (+ WiFi, BLE=BlueTooth Low Energy), Texas Instruments (+ BLE), STMicroelectronics (+ BLE), Microchip/Atmel, Analog Devices (+ BLE), NXP, OnSemiconductor (SiP), SiLabs, M2Com, GCT Semiconductor (+ BLE, CatM1, NB-IoT, EC-GSM, GPS), Innocom, and Wisol.
- The current Sigfox ecosystem is composed of several chipset vendors, device makers, platform providers and solution providers.
- Here’s a graphic from the Sigfox website on their expanding network footprint:
…………………………………………………………………………………………………….
Sigfox’s LPWAN Interoperability using Internet Compression Technology:
In a phone conversation with Sigfox standardization expert Juan Carlos Zuniga last week, I learned that Sigfox plans to achieve LPWAN interoperability at the Application layer, rather than building multi-mode base stations with different radio access networks. Here’s a glimpse on how that might happen:
At the IETF 98 Bits-n-Bites event, March 30th in Chicago, Sigfox demonstrated IoT interoperability with internet compression technology. which enables LPWAN applications to run transparently over different IoT radio access network (RAN) technologies.
To achieve this milestone and enable IP applications to communicate over its network, Sigfox and Acklio implemented Static Context Header Compression (SCHC) -a compression scheme being standardized by the IETF IPv6 over LPWAN working group*, which Juan Carlos participates in. SCHC allows reducing IPv6/UDP/CoAP headers to just a few bytes, which can then be transported over LPWAN network small frame size for low-power, low-cost IoT applications.
…………………………………………………………………………………………………….
* The focus of the IPv6 over LPWAN working group is on enabling IPv6 connectivity over four different Low-Power Wide-Area (LPWA) technologies: Sigfox, LoRa WAN, WI-SUN and NB-IOT (from 3GPP).
…………………………………………………………………………………………………….
The demonstration platform was based on an Acklio compression protocol stack running on Sigfox-enabled devices and cloud-based applications over the live Sigfox network in Chicago. Two scenarios were demonstrated: 1] CoAP requests to legacy IP LPWAN devices, and 2] CoAP interoperability over the live Sigfox and cellular networks in Chicago with IP enabled endpoint devices.
“We are thrilled with this latest milestone in our quest to support and promote interoperability in the IoT,” said Juan-Carlos Zúñiga, senior standardization expert at Sigfox and co-chair of the IETF IntArea working group. “It is critical that the industry rallies together to adopt open internet standards to unlock the true potential of the IoT.”
Compression based technology for LPWAN application interoperability builds on Sigfox’s commitment to supporting the development of IoT interoperability as an active member of standards development organizations including the IETF, ETSI and IEEE 802. And the number of chip companies providing Sigfox network interfaces (see above list) is equally impressive.
References:
https://www.iotforall.com/a-primer-for-loralorawan/
………………………………………………………………………………………………………..
Juan Carlos will be following up with a blog post on LPWAN application layer interoperability as well as a more detailed description of the IETF work on LPWANs.
Sigfox boosts its IoT global footprint, achieving national coverage in 17 countries
At Sigfox World IoT Expo last week in Prague-Czech Republic, Sigfox announced that its network now spans 36 countries, as part of its mission to offer a consistent level of connectivity quality and service anywhere in the world.
Here are the highlights of the Sigfox conference:
- Sigfox’s network is now available in 36 countries, including 17 countries with national coverage and the addition of four new operators in Costa Rica, Croatia, Thailand, and Tunisia.
- A new suite of connectivity services which includes the ability to turn any short-range wireless device into a long range IoT device, connect to the Sigfox network in markets where coverage hasn’t been deployed yet, and new interoperability capabilities which allows IoT devices to recognize and automatically adapt to local communications standards without any additional hardware.
- Partnering with GCT Semiconductor, Sigfox has now launched the first hybrid cellular/Sigfox IoT solution– a chip which can support LTE-M/NB-IoT/EC-GSM and Sigfox IoT connectivity.
- New partnerships with electronics manufacturer Alps Electric Europe, Bosch Connected Devices and Solutions, and strategy consultancy Roland Berger
“We’re excited to work with all of our new partners, this move marks yet another key milestone towards Sigfox’s vision of a global IoT network. We are looking forward to collaborating with our new Sigfox operators to help their local ecosystems to seamlessly scale IoT solutions wherever the Sigfox network is present in the world. Together, we’re building a future that will be better to live in,” said Rodolphe Baronnet-Frugès, Executive Vice President of Operators at Sigfox.
Sigfox operators are not only contributing to accelerate IoT development in their local markets, they are also committing to deploy and operate the network infrastructure and offer national coverage in their country. Up to now, almost 100 million euros have been invested by Sigfox operators to offer a unique access to the Sigfox IoT services, with the exact same quality of service.
This unique global offer is enriched with Sigfox new service Monarch, now allowing IoT devices to recognize and automatically adapt to every local communications standard in the world without roaming. By enabling ‘globe trotter’ assets that can seamlessly adapt as they move across borders, Monarch could be a game-changer for logistics, freight, and consumer goods industries.
……………………………………………………………………………………….
In Ireland, Sigfox Operator VT signed a €1-mill IoT subscription with Dunraven Systems, a market leader in the design and development of ultrasonic fuel tank monitors.
………………………………………………………………………………………..
In addition to its core IoT connectivity service, Sigfox offers a range of services to make even more simple to use Sigfox’s technology, to deploy and to adopt mass IoT solutions. These services allow to connect billions of wireless devices that are not yet connected to the internet.
Above illustration courtesy of Sigfox
………………………………………………………………………………………………………………..
This potential game-changing development has been made possible by the cognitive capabilities of the Sigfox network and its Software Defined Radio technology, where all the network and computing complexity is managed in the Cloud rather than on the device. This enables Sigfox to constantly improve its network features and make them available by simple software upgrade.
……………………………………………………………………………………………..
A key question for Sigfox is whether they’ll also support the new LPWAN standards and specs (LTE category M1, NB-IoT, LoRA WAN, etc). We’ve asked the company and are eagerly awaiting their reply. Stay tuned.
China Telecom: IoT partnerships with 3 network operators; Huawei NB-IoT award from GSMA
China Telecom’s 3 New IoT Partnerships:
China Telecom has entered three new partnership agreements aimed at accelerating the development of services based on an Internet of Things (IoT) open platform.
The operator has announced an expanded partnership with HKT to cover the development of a common IoT open platform to serve the operators’ customers in the combined geographical footprints of mainland China and Hong Kong.
With the arrangement, each network operator’s customers will be able to deploy IoT and M2M services on the other’s network.
The joint offering will allow seamless switching of IoT subscription between networks by integrating the two commonly-deployed embedded universal integrated circuit card platforms. The multi-domestic service is supported by the Ericsson Device Connection Platform (DCP).
China Telecom also announced a similar strategic partnership with Norway-based Telenor Group. That partnership will allow customers from China Telecom and Telenor Connexion to deploy IoT and Machine-to-Machine (M2M) services in each other’s network. It enables China Telecom’s multi-national enterprise customers with outbound IoT business to deploy their assets and offerings under Telenor Connexion’s networks in the European and other Asian Markets.
Similarly, Telenor Connexion’s global customers can enjoy the benefits of the rapidly growing Chinese market by leveraging on China Telecom’s IoT network resources and business capabilities. The seamless switching of IoT subscription between networks is achieved by the integration of the two commonly deployed eUICC platforms which are the key component of IoT collaboration across borders.
To recap, China Telecom’s multi-national enterprise customers will gain access to Telenor Connexion’s IoT networks in Europe and Asian markets, and will serve as Telenor Connexion’s preferred partner for connectivity in China.
…………………………………………………………………………..
A separate agreement with Orange Business Services will enable both companies to serve their respective enterprise customers through a combined footprint across three continents – Asia, Europe and Africa.
The network operators have also agreed to collaborate on the development of new service models supporting global IoT opportunities and to explore the potential of enhancing existing IoT capabilities and applying emerging technologies such as mobile IoT.
GSMA functions to connect participants throughout the global mobile communications ecosystem, including almost 800 operators and over 300 enterprises. The association lays significant emphasis on addressing common concerns to best serve the interests of mobile operators worldwide. GSMA’s “Best IoT Innovation for Mobile Networks” award identifies and rewards Internet of Things (IoT) products, solutions, services, and new business models to highlight innovative breakthroughs based on new technological developments and standards of mobile networks.
Huawei’s NB-IoT solution comprises an NB-IoT terminal chipset, terminal operation system LiteOS, NB-IoT RAN and EPC, OceanConnect (a cloud platform for IoT management), and OpenLab that helps related enterprises develop IoT services and applications. The goal of the Huawei NB-IoT solution is to jointly build a better connected IoT solution and ecosystem with operators and partners from a diverse range of vertical industries. Huawei was the first to launch associated products after 3GPP released standards formulated for NB-IoT – one of multiple competing “standards” for Low Power WANs (LPWANs) targeted at the (non LAN) IoT market.
In 2016, Huawei began conducting NB-IoT trial applications in conjunction with mainstream network operators and partners. In early 2017, Huawei launched Boudica120, the world’s first commercial NB-IoT chip.
http://www.huawei.com/en/news/2017/6/GSMA-Best-IoT-Innovation-Mobile-Networks-Award
Highlights of IoT Developers Conference, April 26-27, 2017 in Santa Clara, CA