The Internet of Things Needs Another 10 Years

The Internet of Things (IoT) is an exciting growth opportunity. The problem is that it is really many different opportunities, each of which will grow at its own pace.

A few markets, such as asset tracking and automatic meter reading, have achieved considerable traction. Others, such as connected cars and smart homes, show great promise. And we all look forward to the day when sensors embedded in our clothing detect health problems in their earliest and most treatable stages.

We still have to learn how to find the value in oceans of data. As Francis daCosta suggests in his free Kindle book, Rethinking the Internet of Things, if we deploy enough wind speed, wind direction, barometric pressure and temperature sensors then we may learn to predict precisely where the next tornado will form. The Internet of Things has many unknown unknowns.

Significant progress has been made over the past decade. We now have low-cost sensors, cloud-based services with global reach and big data analytics. What stands in the way of many promising applications (such as supply-chain management) is the dearth of ubiquitous, low-cost connectivity.

Today’s wireless landscape presents a dilemma. Mobile and satellite networks have great coverage, but they weren’t designed for the IoT. New networks were designed from the ground up for IoT, but they don’t yet provide enough coverage.

One way around the problem is to adapt existing mobile phone and satellite networks to IoT needs. Based in North America, Aeris Communications and Kore serve as intermediaries between enterprises requiring broad geographical coverage and mobile operators. The two companies purchase wholesale data service from operators all over the world so that their customers only have to deal with one service provider. Aeris Communications’ platform provides 2G, 3G, and 4G connectivity, device management (such as provisioning and billing), and sensor data analytics. (Aeris’s CTO Syed Z. Hosain has also written a free e-book that provides an excellent introduction to the Internet of Things for business.) Kore pioneered M2M service rate plans, provides unified management of cellular and satellite network services in more than 180 countries, and serves customers using its PRiSMPro platform with redundant data centers in Atlanta and Las Vegas.

Mobile phone and satellite services are a good fit for monitoring critical assets. In some cases, a critical asset (such as an 18-wheeler) may be equipped with multiple sensors and actuators. These can be networked locally using short-range technologies such as ZigBee, Bluetooth or Wi-Fi. The data can be aggregated by a router or gateway and forwarded over the mobile phone or satellite connection.

However, there are many applications that call for communicating intermittently with simple, inexpensive devices that are dispersed around a city or the countryside. These devices could be installed on street lamps, fire hydrants and traffic signals. Or, they could be deployed by farmers, who want to monitor, soil-moisture. They are too scattered to use short-range wireless technologies, and too numerous and cost-sensitive to use satellite or mobile phone service.

Fortunately, a new-generation of Low Power Wide Area (LPWA) networks are being built that are specifically designed for such IoT applications.

These networks can usually cover a city for an order of magnitude lower cost than a mobile phone network, and they are typically optimized to handle many short messages from large numbers of battery-powered devices.
San Diego-based Ingenu (formerly On-Ramp Wireless) “bring[s] connectivity exclusively to machines.” The company says that its proprietary random phase multiple access (RPMA) technology enables wide area connectivity using unlicensed devices in the globally-available 2.4 GHz band. An RPMA access point can cover 30 to 200 square miles, depending on terrain, communicating with devices that can run for years without having to replace their batteries. Ingenu says it can serve devices that individually consume less than 3 MB of data per month. The company claims 38 private networks operational in 20 countries. Ingenu provides the technology -- operators build their own networks and choose their own business models.

Based in France’s “IoT Valley,” Sigfox competes for similar business using a different approach. The firm sees itself lowering the barriers to Internet of Things connectivity by providing “simple, economical, energy-efficient two-way transmission of small quantities of data over long distances.” Using ultra narrow band (UNB) technology at frequencies below 1 GHz (such as the unlicensed 900 MHz band in the U.S.), Sigfox sells base stations that can cover areas with a radius of a few kilometers (in urban centers) to 50 kilometers (in rural settings).

Operators must share a small percentage of their revenue with Sigfox. Sigfox claims 7 million connections in 12 countries (four of which have built out nationwide networks). In addition to familiar applications, creative solutions inspired by Sigfox include a “smart button” that hotels and restaurants use to call taxis and a sensor for detecting when a fire hydrant has been opened.

Based in San Jose, California, Silver Spring Networks uses a mesh network architecture based on the 802.11.15.4g standard (also known as Wi-SUN) supporting speeds up to about 1 mbps. The company focuses on utility networks and smart cities -- what CEO Mike Bell calls “the Internet of critical Things.” One advantage of a mesh network is that it’s easy to extend coverage a little further (in a cellular network, a new base station may be required). Silver Spring claims 22 million devices connected. Customers include the city of Glasgow, Scotland and Oklahoma Gas & Electric.

Given the huge market forecasts, the mobile phone industry is busy developing IoT standards for 4G and 5G. The industry’s answer to radically different architectures (LPWA and mesh) is an assortment of network, protocol, and device enhancements. This includes LTE-M, which will enable devices that use less bandwidth, consume less power and are less expensive. What’s still missing is the motivation to weigh down networks that are expensive to build and operate with things that, individually, generate very little revenue.

Likewise, there are reasons to be skeptical about the role of IoT in 5G. The mobile phone industry has its hands full trying to deliver greater capacity, lower latency, and higher speeds. At some point you have to ask whether it wouldn’t make more sense to build separate networks for IoT.

The Internet of Things will require a range of technologies and business models. It’s good to see more connectivity options from companies with real customers starting to emerge. Because growing the IoT market will continue to take time.

Computerworld: http://bit.ly/1lCIJeX

« China & Indonesia Engage In Joint Cyber War Simulations
Facebook’s Next New Data Center Is Coming To Ireland »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Orolia

Orolia

Orolia are experts in deploying high precision GPS time through network infrastructure to synchronize critical operations.

Information Security Forum (ISF)

Information Security Forum (ISF)

The ISF is a leading authority on information security and risk management.

Chubb

Chubb

Chubb is the world’s largest publicly traded property and casualty insurer. Commercial services include Cyber Risk insurance.

Online Business Systems

Online Business Systems

Online Business Systems is an information technology and business consultancy. We design improved business processes enabled with robust and secure information systems.

CTM360

CTM360

CTM360 is a unified external security platform offering 24x7x365 Cyber Threat Management for detecting and responding to cyber threats.

Liquid Intelligent Technologies

Liquid Intelligent Technologies

Liquid Intelligent Technologies is a leading communications solutions provider across Africa, providing reliable connectivity, hosting, co-location, and digital services including cyber security.

DAtAnchor

DAtAnchor

Anchor is simply a better way to protect and control sensitive data. Zero-trust, data-centric security. Simplified.

Codean

Codean

The Codean Review Environment automates mundane software analysis tasks, so security experts can focus on finding vulnerabilities.

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

The NCTV serves the Netherlands’ national security. We protect national interests, identify threats and strengthen resilience.

CyberUp

CyberUp

CyberUp is a nonprofit organization created to strengthen the cybersecurity workforce. We help employers reimagine how they grow and scale their cybersecurity workforce.

Kong

Kong

Kong - powering the API world. Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.

APIsentry

APIsentry

APIsentry is a leading provider of comprehensive API security solutions, specializing in protecting organizations from a wide range of cyber threats targeting their Application Programming Interfaces.

Aegis9

Aegis9

Aegis9 is an Australian owned and sovereign consultancy that specialises in providing tailored security solutions for both public and private sector clients based on their specific needs.

Flow Security

Flow Security

Enterprises run on data, Flow secures it at runtime. With a runtime-first approach, Flow is a game-changer in the data security space, securing data itself, beyond the infrastructure it resides in.

FearsOff

FearsOff

FearsOff is a global information security company serving clients worldwide. White hat operators with a black hat mindset to emulate real world attacks and everchanging threat vectors.

12Port

12Port

12Port network security solutions help companies tackle modern cybersecurity threats cost-effectively while implementing zero-trust architectures.