2. Machine to Machine, M2M
•Refers to the technologies that enable products or “things” to
communicate with each other – and with other Internet-
enabled devices and systems.
Internet of Things (IoT)
•Refers to any wire- or wirelessly connected physical object,
including transportation vehicles, sensors, mobile phones or
even people. This is where Machine to Machine (M2M)
technology comes into play - M2M enables the connection of
‘things’.
RAPID GROWTH OF CONNECTED DEVICES COMPARED TO WORLD POPULATION
Year 2003 2015 2020
World population Estimated (Billion) 6.3 7.4 7.7
Estimated # of total connected devices (Million) 500 13.4 38.5
Connected devices per person 0.08 1.48 4.65
Machine to Machine, M2M
3. Challenges of M2M / IoT
connectivity include:
1. Cost control
• As more devices become connected,
how can businesses monitor, manage
and adapt to connectivity costs?
2. Management of many devices
• How can businesses best keep track of,
maintain and regulate the connectivity
of each device without excessive time
and resources?
3. Security
• How do businesses deal with an
increased amount of data
communicated via public channels like
the internet? How can businesses
protect against hackers gaining access to
private networks and misusing data?
4. Increased complexity
• How should businesses best interpret
and use their data to effectively
monetize the IoT using advanced tools
and APIs
Challenges – M2M / IoT
4. Identify the decision
maker
•Knowing the decision
maker is crucial to a
quick close
Be a consultant and
advice / Be real
•Convey to the client
that you care about
their business and
not just the deal
Create a sense of
urgency
•Attach a deadline to
the deal for clients to
commit.
Overcome objections
•Sales presentation
must address and
overcome potential
objections can
speed up any deal
Know your
competition
•Knowing the areas
that you are more
competitive than
your competition
can lead to that
quick close.
Watch what you say
•Keep it to the point
and focus on your
areas of expertise.
Critical factors to close a deal
5. 2FF – 4FF are Industrial Grade SIM with thicker PIN plate to
safeguard devices from:
Corrosion Vibrations Temperatures
Other
environmental
factors
Sim Cards – 4 sizes have features optimal for different business
cases
1FF –
First/largest
2FF – mini 3FF – Micro 4FF – Nano
MFF2 –
Embedded
(Smallest)
M2M SIMs
6. eUICC – Embedded SIM with Device
Logistic
• Device and Sim become one
component and works
globally.
• Installation of SIM during
device production, saves cost
on production and
distribution
Provisioning
• Management of SIM and
switching of MNOs are
seamless.
• Profiles can be changed
anytime without the need for
physical replacement
Connectivity
• Wireless capability is available
at anytime
• Reduces deployment time and
ease of access for end users
Global Connectivity - Universal Integrated Circuit Card (UICC)
Connectivity across multiple
countries - various MNOs & no
roaming charges
It is a feature in SIM, 2FF – 4FF
& MFF2
Minimum SIM memory 512K
Universal Integrated Circuit Card
7. Internet of Things – Physical +
Computer Systems
IoT Roadmap & Challenges
IoT Projected Device Users & Physical
Vulnerabilities
IoT Target Markets
IoT Device and The Usage
Cyber / Network Security
GSM Network & Protocols
8. Internet of Things (IoT) - Physical world + computer-based systems Integration
IoT becomes a cyber-physical systems-
When augmented with sensors and
actuators
• Encompasses technologies such as
• Smart grids
• Smart homes
• Intelligent transportation
• Smart cities
IoT is also expected to generate
• Large amounts of data from diverse locations
• Aggregation of the data
• Increase in the need to index, store and
process such data more effectively
•Electronics
•Software
•Sensors
•Actuators
•Network
connectivity
•That enable these
objects to collect
and exchange data
Internetworking
of physical or
smart devices
which are
embedded with
•Direct integration of
the physical world
into computer-based
systems
•IoT improves
•Efficiency
•Accuracy
•Economic benefit
IoT allows
objects to be
sensed and/or
controlled
remotely across
existing network
infrastructure
9. IoT has evolved due to a convergence
of multiple technologies
•Wireless communication
•Real-time analytics
•Machine learning
•Commodity sensors
•Embedded systems.
Smart device concept started at 1982,
a Coke vending machine became first
internet-connected appliance
•Able to report its inventory
•Whether newly loaded drinks were
cold
IoT Enabler - Roadmap
IoT concept became popular in 1999,
through Radio-frequency identification
(RFID)
If all objects and people in daily life were
equipped with identifiers, computers could
manage and inventory them
10. RAPID GROWTH OF CONNECTED DEVICES COMPARED TO WORLD POPULATION
Year 2003 2015 2020
World population Estimated (Billion) 6.3 7.4 7.7
Estimated # of total connected devices (Million) 500 13.4 38.5
Connected devices per person 0.08 1.48 4.65
Challenges of IoT connectivity
Cost control
Increased in connected
devices, how can
businesses monitor,
manage and adapt to
connectivity costs
Devices Management
How businesses keep
track, maintain and
regulate the connectivity
of each devices without
excessive time and
resources
Security
How businesses deal
with increased in data
communicated via
internet?
Protection against
hackers gaining access to
private networks and
misusing data
Increased complexity
How should businesses
best interpret and use
their data to effectively
monetize the IoT using
advanced tools and APIs
11. Internet of Things and physical vulnerabilities
IoT - opportunities for direct
integration of physical world into
computer-based systems
This will also provide opportunities for misuse
Communication / transferring data between
connected devices are developed without
consideration of security challenges
As IoT grows widely, cyber attacks
are likely to become a physical
threat rather than virtual threat
If a front door's lock is connected to the Internet,
and can be locked/unlocked from a phone, then a
criminal could enter the home at the press of a
button from a stolen or hacked phone.
People could stand to lose much more than their
credit card numbers in a world controlled by IoT-
enabled devices.
Medical devices can be attacked for both in-
hospital diagnostic equipment and also in
implanted devices like pacemakers, insulin pumps
12. Media Environmental monitoring Infrastructure management
Manufacturing Energy management Medical and healthcare
Building and home
automation
Transportation
Metropolitan scale
deployments
Consumer application
IoT Target Verticals
13. *Heart monitoring implants
*Biochip transponders on farm animals
*Automobiles with built-in sensors
*DNA analysis devices for
environmental/food/pathogen
monitoring
*Field operation devices that assist
firefighters in search and rescue
operations
"Things,"refertovarietyofdevices:
These devices collect useful data with the help of various existing technologies and then autonomously flow the data
between other devices.
Smart home -
control and
automate
appliances
Lighting
Heating
Air
conditioning
Washer /
dryers
Ovens
Refrigerators /
freezers
Things in IoT
14. •CPU
•Memory
•Power resources
IoT used in nearly every field as because of the ability the network
embedded devices with limited
•Natural ecosystems
•Buildings and factories
IoT allows collection of information ranging from
•Intelligent shopping systems - monitors specific users' purchasing habits by tracking the mobile
phones. These users could then be offered with
•Special offers on their favourite products
•Even location of items that they need
IoT systems also can help in
•Sensing and actuating for applications that deal with heat, electricity and energy management
•Enabling extended home security features and home automation
•Internet of living things - biological sensors to analyse and study DNA or other molecules
Additional examples
Everything connected with the help of Internet
15. Consumer
application
Car
Entertainment
Residences/smart homes
Wearable technology
Quantified self
Connected health
Smart retail
Enterprise
application
Media & Big Data
Fleet Tracking
Environment Monitor
Energy Management
Medical Healthcare
Manufacturing
Infrastructure Management
Building Automation
IoT devices are created more for consumer use
IoT products
Classified in five
categories
Smart
wearable
Smart
home
Smart city
Smart
environment
Smart
enterprise
IoT Devices
The IoT products and solutions in
each of these markets have different
characteristics
16. Big data and the IoT work in conjunction – Media & Advertising Industry
17. Protection to
hardware/software
and the
information on
them from
•Theft or damage
•Disruption of service
•Misdirection of the services they
provide
•Network access
•Date / code injection
•Malpractice by operators - tricked into
deviating from secure procedures
Critical area as to
the increased
reliance on
computer systems
and the Internet
•Wireless networks such as Bluetooth
and Wi-Fi
•Growth of "smart" devices, including
smartphones, televisions
Cyber Security
18. Types of Vulnerabilities and attacks
Backdoors
Denial-of-service attack
Direct-access attacks
Eavesdropping
Spoofing
Tampering
Privilege escalation
Phishing
Clickjacking
Social engineering
Systems at risk
Financial systems
Utilities and industrial equipment
Aviation
Consumer devices
Large corporations
Automobiles
Government
Internet of Things and physical vulnerabilities
19. Network security
UMTS introduced - Universal Subscriber Identity
Module (USIM)
•For greater security
•Mutually authenticating
network and user
Uses a longer
authentication
key
•Authentication levels
•Authorization capabilities
•No non-repudiation.
GSM offers
limited
New attacks are due to
poor
•Security
implementations
•Architecture
•Development for
smartphone
applications
Wiretapping and
eavesdropping
techniques – allows
third party to listen in to
conversations
GSM was intended to be a
secure wireless system with
the user authentication using
•Pre-shared key and
challenge-response
•Over-the-air encryption
However, GSM is vulnerable to
different types of attack, each
of them aimed at a different
part of the network
GSM only authenticates the
user to the network (and not
vice versa)
20. Internet Protocol
In addition to offering more
addresses, IPv6 also implements
features not present in IPv4
*Address assignment
*Network renumbering
*Router announcements when
changing network connectivity
providers
It simplifies aspects of:
Every device on the Internet is assigned a unique IP address for
Identification Location definition Traffic routes across the Internet
IPv6 is intended to replace IPv4
Because of address exhaustion
21. IP address will remain
same every time you
connect, from one place
(home)
•IP address would be
different if the
devices are used in
different location
connected to other
connection.
•IP address doesn't
travel with you
•But at home, it would
always be the same if
it's the static type.
Here are the advantages
of a static IP address:
•Businesses are better
suited for it than
residences.
•It's also better for
dedicated services
such as mail, FTP and
VPN servers.
•It's good for creating
or hosting computer
servers.
•It makes it easier for
geolocation services
to accurately assess
where you are.
•Because of these
advantages, it
shouldn't be a
surprise to learn that
it costs more to get
one.
A static IP address is
assigned by request and
for a fee by a service
providers
•Static. Stand. Stable.
Yes, static IP
addresses don't
change
•Static IP address is
assigned to a device
by an (ISP) to be its
permanent address
on the Internet.
Static IP Address
22. Dynamic IP Address
You'll read most
everywhere that a
dynamic IP address can
change "at any time.“
•But it is possible that
it won't change for
months
•Not really a big deal
because all an IP
address does is keep
you connected.
There are a few more
reasons you can feel
good about a dynamic IP
address:
•It doesn't cost you
anything extra.
•It's carefree,
automatic and
reliable with little
work on your end.
•Geolocation might
be less accurate, if
that matters to you.
•For your ISP, it's the
most efficient use of
IP addresses.
•Technically, your
computer or device
"leases" (at no extra
charge) an IP address
to get connected.
Possibility that the
upload and download
speeds would be faster
with a static IP address
•Unable to set up a
reliable server with a
changeable IP
address
23. GSM Technology
GSM (Global System for Mobile Communications, originally Groupe SpécialMobile)
•A standard developed by the European Telecommunications Standards Institute (ETSI)
•To describe the protocols for second-generation (2G) digital cellular networks used by mobile
phones
•First deployed in Finland in July 1991
2G networks developed as a replacement for first generation (1G) analog cellular networks
GSM described a digital, circuit-switched network optimized for full duplex voice telephony
This expanded over time to include data communications
•First by circuit-switched transport
•Then by packet data transport via GPRS (General Packet Radio Services)
•EDGE (Enhanced Data rates for GSM Evolution or EGPRS.
Subsequently, the 3GPP developed
•Third-generation (3G) UMTS standards
•Followed by fourth-generation (4G) LTE Advanced standards
•Which do not form part of the ETSI GSM standard.